Telefonica Breach: Infostealer Malware Opens Door for Social Engineering TacticsTelefonica, a major telecommunications company, recently confirmed a breach in their internal ticketing system, which led to a significant…3d ago3d ago
How Hackers Really Used Infostealers for the Biggest Recent Cyber BreachesWe are now at a point where numerous cyberattacks have been carried out using compromised Infostealer data. Major companies such as AT&T…Oct 16, 2024Oct 16, 2024
Infostealer Malware Infections Shed Light on Sanctioned Entities & Exposes New Sanctioning…Hudson Rock’s continued research explores how Infostealer infections can provide insights into sanctioned entities and identify new…Aug 29, 2024Aug 29, 2024
Meet the Top 5 Threat Actors Exploiting Infostealers Data to Breach CompaniesAs Infostealers become increasingly favored by cybercriminals and hacking groups as a primary method for breaching companies, it’s crucial…Aug 8, 2024Aug 8, 2024
Infostealer Infection Results in Blockchain Identity Platform Fractal ID HackOn July 14th, 2024 Blockchain identity platform Fractal ID suffered a data breach resulting in sensitive KYC data of over 55,000…Jul 20, 2024Jul 20, 2024
Re-Infected: The Persistent Threat of InfostealersHaving your data stolen once is bad enough, but for some people, it happens repeatedly.Jul 8, 2024Jul 8, 2024
Open-Sourced Infostealers About to Fuel New Wave of Computer InfectionsA potential shift in Infostealers might be happening again. Traditionally, teams of cybercriminals develop an Infostealer family (variant)…Jul 1, 2024Jul 1, 2024
ID Verification Service for X & TikTok Breached due to an Infostealer InfectionOriginal findings by Joseph Cox of 404MediaJun 27, 2024Jun 27, 2024
Botnets Are Dead, Long Live Infostealers (A Comparison)The landscape of cyber threats has been shifting dramatically in recent years, with a notable transition from traditional botnets to a more…May 24, 2024May 24, 2024