Blogs, articles and more
Your Source for All Things Security
Browse Through All Our Blogs:

The Rising Threat of Log-Based Cyberattacks
Cybercriminals are not just hacking in. Increasingly, they’re simply logging in with stolen credentials and session data. A surge in “log-based” cyberattacks is putting organizations at risk. These attacks revolve around infostealer...

When Hackers Get Hacked: The Lumma Infostealer Takedown
How global law enforcement dismantled one of the most pervasive infostealer operations, and what it means for credential security Lumma Stealer (also known as LummaC2) had become today’s most popular and widely...

Rhadamanthys Resurfaces: Inside the Return of a Sophisticated Infostealer
Originally surfacing in late 2022, the Rhadamanthys infostealer quickly made headlines for its ability to steal login credentials, browser cookies, and most notably, cryptocurrency wallets. From the start, Rhadamanthys came packed with...

Analyzing the Latest Version of Lumma Stealer
Discover how Lumma Stealer works, how it evades detection, and how Twilight Cyber’s Identity Threat Protection helps defend against infostealer-driven attacks through real-time credential monitoring and proactive defense strategies.

Zeroing In on Stolen Credentials: Automated Detection & Response in 2025
The threat of compromised credentials reached unprecedented levels in 2025, with infostealer malware surging to infect millions of devices and dark‑web marketplaces trading billions of stolen logins. According to our research, over...

The Rise of Infostealers: Insights from 2024
CheckPoint’s 2025 Cyber Security Report reveals that infostealers have become one of the most dominant cyber threats. Once a niche tool, these programs now play a critical role in the cybercrime ecosystem....

Telefonica’s Recent Breach: A Wake-Up Call for Infostealer Threat Intelligence
Spanish telecommunications giant Telefonica recently fell victim to a significant cybersecurity breach, showing that even large organizations can be vulnerable. The event highlights how important it is to maintain strong defenses, especially...

How do Infostealers manage to bypass EDRs and XDRs?
Endpoint Detection and Response systems (EDRs) promise to protect the endpoints of your IT systems against malware, ransomware, and other types of malicious code. As a result, companies of all sizes have...

The Lifecycle of Stolen Credentials on the Dark Web
Most cyberattacks start with stolen credentials. Read here to see how cybercriminals obtain, process, and exploit your login information in the underground economy.