News

Social engineering attacks made up 36% of intrusions from May 2024 to May 2025, surpassing malware and exploits as the top ...
To date, the data thieves have pilfered more than 200,000 unique passwords, hundreds of credit card records, and more than 4 ...
VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, has released its email ...
In a recent announcement, Microsoft revealed it has successfully disrupted the infrastructure behind Lumma, a malware tool favored by cyber thieves for its ability to steal sensitive personal ...
Cybercrime skyrocketed in 2025, with identity theft, ransomware, and data breaches driven by cheap infostealer posing the ...
ClickFix abuses clipboards. FileFix hijacks File Explorer. Both social engineering attacks start in the browser—and end in ...
In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠⁠Sherrod DeGrippo⁠ is joined by Richard Boscovich and Derek Richardson from Microsoft’s Digital Crimes Unit to unpack the global ...
The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s infrastructure.
Malware Disguised As VPN Apps: Increasing reliance on open-source repositories calls for much higher-level vigilance to counter deceptive tactics.
Treasury officials said Aeza’s infrastructure supported multiple malware and ransomware groups, including the operators behind the Meduza and Lumma infostealers, which have targeted U.S. defense ...