More

    Exploits

    UNC5142 Exploits Blockchain to Infect 14,000 WordPress Sites with Malware

    In a sophisticated cyber campaign that has compromised over 14,000 WordPress websites, a threat actor tracked as UNC5142 is exploiting blockchain technology to distribute...

    Hackers slip malware inside blockchain to steal cryptocurrency — EtherHiding embeds malicious JavaScript payloads in smart contracts on public blockchains

    (Image credit: Getty / Eugene Mymrin) A North Korean state-sponsored hacking crew is now using public blockchains to host malicious payloads, according to new research...

    Malware Campaign Compromises Over 14,000 WordPress Sites

    Over 14,000 WordPress sites have been infected and compromised to run the coin-miner distributed malware campaign, according to analysis from Google’s 

    Sonatype’s Q3 Open Source Malware Index Shows Hackers Are Playing the Long Game

    Sonatype, a provider of AI-centric DevSecOps, this week released the Open Source Malware Index, Q3 2025, which analyzed 34,319 open source malware packages discovered by...

    North Korean hackers now hide crypto-stealing malware with blockchain

    North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their crypto theft operations. 

    North Korean threat actors turn blockchains into malware delivery servers

    ‘EtherHiding’: Nation-state and cybercriminal groups are leveraging smart contracts as command-and-control servers for deliveing malicious payloads hidden on blockchains. 

    Cloud Ransomware: Risks, Detection and Prevention Strategies

    Understanding cloud ransomware and why it's different Cloud ransomware is malware that targets data and systems stored in cloud environments like AWS, Azure, or Google...

    Microsoft: Ransomware Powers Most Cyberattacks

    Microsoft: Ransomware Powers Most Cyberattacks Microsoft reports ransomware drives over half of cyberattacks, fueled by AI, automation, and credential theft. Written...

    What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts

    "EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract. News COINTELEGRAPH...

    Latest articles