Blogs, articles and more
Your Source for All Things Security
Browse Through All Our Blogs:

TamperedChef: Inside the Info-Stealer Hiding in Fake PDF Tools
Cybercriminals are increasingly exploiting PDFs as a delivery vehicle for malware, capitalizing on the trust users place in everyday document tools. Attacks using malicious PDF files have skyrocketed, rising more than 1,160%...

Rhadamanthys Update: New “ClickFix” Delivery Chain and Threat Insights
A few months ago, we explored the rapid rise of Rhadamanthys, a sophisticated information-stealing malware making waves across the underground. Since then, the threat has continued to evolve, adopting new delivery techniques...

Why Password Managers Alone Can’t Stop Infostealers
Password managers have been a cybersecurity best practice for a long time, and for good reason. They provide an encrypted vault to store all your login credentials behind one strong master password,...

The Rising Threat of Log-Based Cyberattacks
Cybercriminals are not just hacking in. Increasingly, they’re simply logging in with stolen credentials and session data. A surge in “log-based” cyberattacks is putting organizations at risk. These attacks revolve around infostealer...

When Hackers Get Hacked: The Lumma Infostealer Takedown
How global law enforcement dismantled one of the most pervasive infostealer operations, and what it means for credential security Lumma Stealer (also known as LummaC2) had become today’s most popular and widely...

Rhadamanthys Resurfaces: Inside the Return of a Sophisticated Infostealer
Originally surfacing in late 2022, the Rhadamanthys infostealer quickly made headlines for its ability to steal login credentials, browser cookies, and most notably, cryptocurrency wallets. From the start, Rhadamanthys came packed with...

Analyzing the Latest Version of Lumma Stealer
Discover how Lumma Stealer works, how it evades detection, and how Twilight Cyber’s Identity Threat Protection helps defend against infostealer-driven attacks through real-time credential monitoring and proactive defense strategies.

Zeroing In on Stolen Credentials: Automated Detection & Response in 2025
The threat of compromised credentials reached unprecedented levels in 2025, with infostealer malware surging to infect millions of devices and dark‑web marketplaces trading billions of stolen logins. According to our research, over...

The Rise of Infostealers: Insights from 2024
CheckPoint’s 2025 Cyber Security Report reveals that infostealers have become one of the most dominant cyber threats. Once a niche tool, these programs now play a critical role in the cybercrime ecosystem....
