More

    Exploits

    How Avast Helps Protect Millions From Online Scams, Malware, and Phishing in 2025 – Report by Expert Consumers

    This is a paid press release. Contact the press release distributor directly with any inquiries. PR Newswire 6 min read NEW YORK, Oct. 18, 2025 /PRNewswire/...

    UNC5142 Hackers Exploit Blockchain to Infect 14,000+ WordPress Sites

    In a sophisticated cyber campaign that has compromised thousands of websites, hackers have exploited vulnerabilities in WordPress platforms to distribute malware through an innovative...

    Winos 4.0 hackers expand to Japan and Malaysia with new malware

    Pierluigi Paganini October 18, 2025 Threat actors behind Winos 4.0 (ValleyRAT) have expanded their attacks from China and Taiwan to Japan and Malaysia, using...

    North Korean Hackers Deploy EtherHiding Malware via Blockchain

    In a sophisticated evolution of cyber tactics, North Korean hackers have begun exploiting blockchain technology to distribute malware, turning immutable ledgers into stealthy delivery...

    UNC5142 Exploits Blockchain to Infect 14,000 WordPress Sites with Malware

    In a sophisticated cyber campaign that has compromised over 14,000 WordPress websites, a threat actor tracked as UNC5142 is exploiting blockchain technology to distribute...

    Hackers slip malware inside blockchain to steal cryptocurrency — EtherHiding embeds malicious JavaScript payloads in smart contracts on public blockchains

    (Image credit: Getty / Eugene Mymrin) A North Korean state-sponsored hacking crew is now using public blockchains to host malicious payloads, according to new research...

    Malware Campaign Compromises Over 14,000 WordPress Sites

    Over 14,000 WordPress sites have been infected and compromised to run the coin-miner distributed malware campaign, according to analysis from Google’s 

    Sonatype’s Q3 Open Source Malware Index Shows Hackers Are Playing the Long Game

    Sonatype, a provider of AI-centric DevSecOps, this week released the Open Source Malware Index, Q3 2025, which analyzed 34,319 open source malware packages discovered by...

    North Korean hackers now hide crypto-stealing malware with blockchain

    North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their crypto theft operations. 

    Latest articles