LummaC2 Trig Defense and Cyber Threats
LummaC2, a stealer malware, has undergone significant updates, including a novel anti-sandbox technique based on trigonometry.
LummaC2, a stealer malware, has undergone significant updates, including a novel anti-sandbox technique based on trigonometry.
An updated version of the Jupyter Infostealer malware, also known as Polazert, SolarMarker, and Yellow Cockatoo, has re-emerged with stealthier tactics
A new cyber threat named ExelaStealer has emerged as a cost-effective information-stealing tool, joining the crowded landscape of malware
In a significant shift, cybercriminal groups behind the RedLine and Vidar infostealers have expanded their operations to include ransomware distribution.
Kaspersky discovered that some Linux users were redirected to a malicious package repository, which installed information-stealing malware on their systems.
A previously unknown threat actor has been observed exploiting critical security vulnerabilities in the MinIO high-performance object storage system.
LokiBot is commodity infostealer for Windows. It harvests credentials from a variety of applications, web browsers, email clients, IT administration tools.
Astaroth is a highly prevalent, information-stealing Latin American banking trojan. It is written in Delphi and has some innovative execution and attack techniques.
A new cyber espionage campaign is underway in North Africa, featuring a custom backdoor called Stealth Soldier, as part of a set of highly-targeted attacks.
Cybersecurity researchers have uncovered a new information-stealing malware named Bandit Stealer, which focuses on targeting browsers.