Lumma Stealer – Tracking distribution channels ​

Lumma Stealer – Tracking distribution channels ​

Read More  Introduction The evolution of Malware-as-a-Service (MaaS) has significantly lowered the barriers to entry for cybercriminals, with information stealers becoming one of the most commercially successful categories in this underground economy. Among these...
Phishing attacks leveraging HTML code inside SVG files ​

Phishing attacks leveraging HTML code inside SVG files ​

Read More  With each passing year, phishing attacks feature more and more elaborate techniques designed to trick users and evade security measures. Attackers employ deceptive URL redirection tactics, such as appending malicious website addresses to seemingly safe...