Exploits

New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers

A recently discovered strain of cryptomining malware has captured the attention of security teams worldwide by abusing the built-in Windows Character Map application as...

Attacks with Stealerium malware spike

Intrusions deploying the Stealerium information-stealing malware have escalated from May to August following an over a year-long lull, reports ITPro. 

‘NotDoor’ malware tied to Russia’s APT28 exploits Microsoft Outlook

Campaign targets various vertical sectors in multiple NATO-based countries. 

Cybercriminals ‘Grok’ Their Way Past X’s Defenses to Spread Malware

Hackers Weaponize Grok to Spread Malware Hackers exploit X’s Grok AI to spread malware via promoted ads, exposing millions to...

AI-powered PromptLocker ransomware is just an NYU research project — the code worked as a typical ransomware, selecting targets, exfiltrating selected data and encrypting...

(Image credit: Pexels) ESET said on Aug. 26 that it had discovered the first AI-powered ransomware, which it dubbed PromptLocker, in the wild. But it...

143,000 Malware Files Target Android and iOS Devices in Q2 2025

Mobile threats continued to dominate the cyber landscape in the second quarter of 2025, as Kaspersky researchers uncovered nearly 143,000 malicious installation packages for...

Large language models can execute complete ransomware attacks autonomously, research shows

Criminals can use artificial intelligence, specifically large language models, to autonomously carry out ransomware attacks that steal personal files and demand payment, handling every...

TAG-150 Hackers Deploy Custom Malware Families to Target Organizations

A new and highly sophisticated cyber threat actor, known as TAG-150, has emerged on the global stage, wreaking havoc since March 2025 with a suite...

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families

A sophisticated threat actor, TAG-150, active since at least March 2025. Characterized by rapid malware development, technical sophistication, and a sprawling multi-tiered infrastructure, TAG-150...

Latest articles