More

    Exploits

    Lampion Stealer Uses ClickFix Technique to Steal Login Credentials

    Brazilian threat actors behind the Lampion banking trojan have evolved their infection tactics by incorporating the ClickFix social engineering technique to distribute credential-stealing malware....

    npm hit by PhantomRaven supply chain attack

    A new supply chain attack dubbed PhantomRaven has flooded the npm registry with malicious packages that steal credentials, tokens, and secrets during installation. The...

    Airstalk Malware Targets Windows Systems Using Multithreaded C2 Communication to Steal Credentials

    Unit 42 researchers have identified a sophisticated Windows-based malware family, Airstalk, that exploits legitimate mobile device management APIs to establish covert command-and-control channels. The malware...

    Community hospital in Colorado thwarts ransomware attack, says patient data is safe

    Family West Health, a 25-bed facility, said it spotted a cyberattack this week that forced it to shut down IT systems. However, it confirmed...

    Credential-stealing npm packages hide beneath 4 layers of obfuscation

    The 10 typosquatted packages imitate discord.js, TypeScript and other popular packages. 

    Talk about geriatric – This devious Android malware escapes detection by typing like an old person

    (Image credit: Shutterstock / mindea) Herodotus malware mimics human typing to evade timing-based antivirus detection Spread via SMS phishing, it installs silently using fake screens and...

    Typosquatted Npm Packages Deliver Cross-Platform Malware

    Security researchers have disclosed a campaign of typosquatted npm packages that automatically execute on install and ultimately deliver a cross-platform credential stealer. According to researchers, the malicious packages were first published...

    Ransomware hackers are now running Linux encryptors in Windows to stay undetected

    Image credit: Pixabay (Image credit: Future) Qilin ransomware uses WSL to run Linux encryptors stealthily on Windows systems Attackers bypass Windows defenses by executing ELF binaries inside...

    Threat Actors Exploit Judicial Documents to Deliver PureHVNC RAT

    IBM X-Force has identified a coordinated phishing campaign targeting Colombian users between August and October 2025 that leverages spoofed judicial communications to distribute the...

    Latest articles