Darktrace researchers say hackers used AI and LLMs to create malware to exploit the React2Shell vulnerability to mine ...
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
Microsoft warns that Python-based infostealers are increasingly targeting macOS, harvesting sensitive data and challenging assumptions about Apple's malware immunity..
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware.
The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection by concatenating up to 1,000 archives. In doing so, the malware, which is an ...
Keeping up with the latest malware threats is a full-time job, and honestly, it’s getting pretty intense. From AI messing ...
This week’s cybersecurity recap highlights key attacks, zero-days, and patches to keep you informed and secure.
Group-IB found a ransomware dubbed DeadLock that is exploiting Polygon smart contracts to rotate proxy addresses to evade takedowns. A recently-discovered ransomware dubbed “DeadLock” is stealthily ...
UPDATE (January 30 th, 2026): For a technical breakdown of the incident affecting a company in Poland’s energy sector, refer to this blogpost. In late 2025, Poland’s energy system faced what has been ...