More

    Exploits

    The Unkillable Threat: How Attackers Turned Blockchain Into Bulletproof Malware Infrastructure

    The blockchain was supposed to revolutionize trust. Instead, it’s revolutionizing cybercrime. Every foundational principle that makes blockchain technology secure—decentralization, immutability, global accessibility—has been systematically inverted...

    Luma Infostealer Malware Launches Attacks to Steal Browser Cookies, Cryptocurrency, and Remote Access Accounts

    A sophisticated information-stealing malware known as Lumma Infostealer is resurging as a major cyber threat. It targets high-value credentials and sensitive assets stored on Windows systems....

    Russian hackers evolve malware pushed in “I am not a robot” captchas

    The Russian state-backed Star Blizzard hacker group has ramped up operations with new, constantly evolving malware families (NoRobot, MaybeRobot) deployed in complex delivery chains...

    Cybercriminals turn to stealth to bypass malware detection

    A new report reveals a 40 percent (quarter-over-quarter) increase in evasive, advanced malware. The data highlights encrypted channels as adversaries' favored attack vector using...

    OpenVSX, VSCode subjected to self-propagating GlassWorm malware

    BleepingComputer reports that the novel self-propagating GlassWorm malware has been injected into a dozen OpenVSX and Microsoft VSCode extensions, which have been downloaded 35,800...

    PassiveNeuron Targets High-Profile Servers to Deploy Malware

    A sophisticated cyberespionage campaign dubbed PassiveNeuron has emerged from the shadows after months of dormancy, with security researchers uncovering fresh details about its operations...

    Microsoft: 52% of Cyberattacks Driven by Ransomware and Extortion

    Key Takeaways: Over half of global cyberattacks are now motivated by extortion and ransomware. Legacy security systems are failing against AI-driven and supply chain threats. Microsoft urges...

    New Luma Infostealer Malware Steals Browser Data, Cryptocurrency, and Remote Access Accounts

    Luma Infostealer, a malware-as-a-service (MaaS) offering, has emerged as a potent threat targeting high-value credentials such as web browser cookies, cryptocurrency wallets, and VPN/RDP...

    New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER

    Over the summer of 2025, a novel malware family emerged following the public disclosure of the LOSTKEYS implant. This new strain was rapidly weaponized...

    Latest articles