
The Google 0-day all Infostealer groups are exploiting.
Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups…
Home » Cybercriminals
Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups…
Session cookies are specific web cookies used to allow a browsing session to log in to a website’s services automatically…
The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software…
In a significant development, the creators of the well-known Infostealer group, Lumma, have reportedly made a groundbreaking discovery…
What causes a man to wake up one day and say, “I’m going to build my own malware and go sell it to cybercriminals on the dark web”?
A relatively unknown threat actor who goes by the alias “USDoD” posted a thread in which they offered the database of the FBI’s…
In this second of a three blog post series, Cyrus and Hudson Rock reveal how the info-stealer threat looks from the hacker’s point of view…
By [Alon Gal] | February 2025 Introduction: When National Security Gets Compromised for $10 For years, the U.S. military and its defense contractors have been considered
Hudson Rock has been the go-to source for all things cybersecurity and infosec updates. Be it offering dark web intelligence or finding one’s own data
Cybercriminals are continuously evolving their tactics to exploit human behavior and trust. In one of the latest campaigns, attackers have weaponized fake CAPTCHA verification systems—tools
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.