Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown
Nov 13, 2025Ravie LakshmananBotnet / Cybercrime Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted...
Nov 13, 2025Ravie LakshmananBotnet / Cybercrime Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted...
Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics | Trend Micro (US) Content has been...
03 November 2025 The 2 billion email address stealer log breach I talk about this week is almost ready to...
Conclusion As Lumma Stealer activity continues to decline and underground actors migrate to Vidar and StealC alternatives, security teams should...
Sep 20, 2025Ravie LakshmananSoftware Security / Malware LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS...
Threat actors use fake AI tools to deliver the information stealer Noodlophile Pierluigi Paganini May 12, 2025 Threat actors use...
DataSafe Thief Variant A Label thief_plan.ps1datasafe_snatch.ps1 Fingerprint 2f8bf3e5b6cbdb0c8e5935b0787118671fbe357c26133a4b39b96fdd2c48f1ae Identity Check Ca4fea2deacb9665461eb74b6422b137326c0d7657ab6bdbb41289f3c8983d5b48fc98c08782ed1f Hash Code B29e630b9c70b0daaba4f83489494444c04c7a470b9c24eb4ddffb6cd7cf05ff677601f72181c53541f850248dd0904153ea62458489d7aa782149b93399ebd8 Volume 368111 bytes371740 bytes Format PowerShell...
Information Thief Disguises itself as LDAPNightmare (CVE-2024-49113) Proof of Concept Exploit | Trend Micro (US) Content has been added to...
Experts in digital security have revealed a fresh remote access trojan and data thief leveraged by Iranian government-supported individuals to...
Aug 16, 2024Ravie LakshmananMalware / Browser Security Cyber experts have unearthed a fresh filcher malware that's meticulously crafted to go...
Jun 20, 2024The Hacker NewsEndpoint Protection / Data Security Main Points Complex Tool Environment: Investigate the vast range of cybersecurity...
Jun 20, 2024The Hacker NewsEndpoint Protection / Data Security Key Points Complex Tool Environment: Delve into the extensive range of...
June 20, 2024NewsroomMalicious Hacking / Essential Infrastructure Hackers linked to China have been conducting a continuous scheme targeting multiple telecom...
Jun 20, 2024NewsroomCyber Espionage / Critical Infrastructure Since 2021, there has been ongoing infiltration by cyber espionage groups linked to...
June 20, 2024NewsroomThreat Intelligence / Cybercrime An emerging information-stealing malware written in Rust, dubbed as Fickle Stealer, has been spotted...