News

A deceptive fake error attack vector, ClickFix, surged by over 500%, becoming the second most common attack method after ...
IntroductionZscaler ThreatLabz researchers recently uncovered AI-themed websites designed to spread malware. The threat actors behind these attacks are exploiting the popularity of AI tools like ...
The H1 2025 issue of the ESET Threat Report reviews the key trends and developments that shaped the threat landscape from ...
A new cybersecurity campaign has exposed 67 trojanized GitHub repositories, targeting gamers and developers with malicious ...
Lumu, the cybersecurity company pioneering Continuous Compromise Assessment, today issued the 2025 Compromise Report ...
U.S. sanctions Russian BPH provider Aeza Group for hosting ransomware attacks, dark web drugs, and cybercrime.
Tron-based crypto address linked to bulletproof hosting provider Aeza Group sanctioned by U.S. Treasury after receiving ...
The additional payloads downloaded by the backdoor include info-stealers and remote access trojans such as Lumma Stealer, AsyncRAT, and Remcos, all featuring extensive data theft capabilities ...
While the final payloads varied, they often delivered known threats like Lumma Stealer or AsyncRAT. Researchers believe many of these projects were seeded across forums and social platforms to lure ...
FBI, Secret Service operation takes down AVCheck site used to test malware Microsoft takes legal action against Lumma Stealer after 400,000 devices infected ...