Muck Stealer Malware Used Alongside Phishing in New Attack Waves
A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer,…
More results...
A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer,…
Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these forces are playing out in real-world incidents and how they are changing the …
A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using…
A new, sophisticated phishing kit, Salty2FA, is using advanced tactics to bypass MFA and mimic trusted brands. Read…
MostereRAT malware targets Windows through phishing, bypasses security with advanced tactics, and grants hackers full remote control. Cybersecurity…
North Korea’s Lazarus Group uses the ClickFix scam in fake crypto job interviews to deploy malware, steal data,…
Researchers at Guardio Labs have uncovered a new “Grokking” scam where attackers trick Grok AI into spreading malicious…
A new and clever ClickFix scam is using a fake AnyDesk installer and Windows search to bypass security,…
A Facebook malvertising campaign is spreading the Brokewell spyware to Android users via fake TradingView ads. The malware…
CTM360 research reveals how scammers hook their victims through manipulative traps built on AI, stolen data, and brand…