Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.
Browsing: Malware
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Identity verification systems are struggling…
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives,…
CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day…
Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known as ScarCruft has been attributed to a fresh…
Ravie LakshmananFeb 24, 2026Cyber Espionage / Malware A Russia-aligned threat actor has been observed targeting a European financial institution as…
A new infostealer named ‘Arkanix Stealer’ operated as a malware-as-a-service (MaaS) enterprise in a one-shot campaign, Kaspersky says. Implemented in…
As the US prepares for a possible military strike against Iran, the nation-state threat group MuddyWater is wasting no time…
Ravie LakshmananFeb 23, 2026Malware / Threat Intelligence The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a…
