Lumma Stealer toppled by globally coordinated takedown
ThreatWatcher May 21, 2025 0 96
Trojanized RVTools push Bumblebee malware in SEO poisoning campaign
ThreatWatcher May 21, 2025 0 96
European Union sanctions Stark Industries for enabling cyberattacks
ThreatWatcher May 21, 2025 0 94
ThreatLocker Patch Management: A Security-First Approach to Closing Vulnerability Windows
ThreatWatcher May 21, 2025 0 95
Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
ThreatWatcher May 21, 2025 0 95
Lumma infostealer malware operation disrupted, 2,300 domains seized
ThreatWatcher May 21, 2025 0 91
The Day I Found an APT Group In the Most Unlikely Place
ThreatWatcher May 21, 2025 0 88
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
ThreatWatcher May 21, 2025 0 76
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps
ThreatWatcher May 21, 2025 0 65
How to Detect Phishing Attacks Faster: Tycoon2FA Example
ThreatWatcher May 21, 2025 0 71
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
ThreatWatcher May 21, 2025 0 82
A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon
ThreatWatcher May 21, 2025 0 83
Coinbase says recent data breach impacts 69,461 customers
ThreatWatcher May 21, 2025 0 67
Assured Telematics Inc (ATI) Fleet Management System with Geotab Integration
ThreatWatcher May 21, 2025 0 98