
Pure Logs Stealer Fails to Impress.
Pure Logs Stealer first appeared on hacking forums at the end of October 2022. The stealer is developed by a malware developer…
Pure Logs Stealer first appeared on hacking forums at the end of October 2022. The stealer is developed by a malware developer…
Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups…
During the summer of 2023, cyberattacks rose significantly, according to data from the new quarterly BlackBerry Global Threat Intelligence Report, November 2023 edition…
Windows and macOS systems have been subjected to attacks leveraging the novel Go-based information-stealing malware JaskaGO, reports The Hacker News…
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found…
A threat actor attempts to sell access to a sensitive area of Binance — the major cryptocurrency exchange’s…
It is not uncommon for threat actors to exploit login data obtained from Infostealer infections to carry out various types of cyberattacks…
In today’s digital landscape, the reliance on password managers has become commonplace, providing users with a sense of security…
Session cookies are specific web cookies used to allow a browsing session to log in to a website’s services automatically…
The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software…
In a significant development, the creators of the well-known Infostealer group, Lumma, have reportedly made a groundbreaking discovery…
Recent weeks have seen a number of macOS-specific infostealers appear for sale in crimeware forums…
What causes a man to wake up one day and say, “I’m going to build my own malware and go sell it to cybercriminals on the dark web”?
Rapid7 routinely conducts research into the wide range of techniques that threat actors use to conduct malicious activity…
Recently, Rapid7 observed the Fake Browser Update lure tricking users into executing malicious binaries…
This blog post aims at presenting the life cycle of logs, the cybercrime marketplaces dedicated to logs and the noticeable schemes…
This year has seen an explosion of infostealers targeting the macOS platform. Throughout 2023…
A relatively unknown threat actor who goes by the alias “USDoD” posted a thread in which they offered the database of the FBI’s…
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.