![](https://www.infostealers.com/wp-content/uploads/2024/06/Screenshot-2024-06-19-at-14.44.09-768x405.png)
Infostealers Webinar – Hudson Rock
Learn about Infostealers with actual real life breaches caused by Infostealer infections with Leonid Rozenberg, Hudson Rock’s Head of Partnerships & Integrations. To discover how
Home » Hudson Rock
Learn about Infostealers with actual real life breaches caused by Infostealer infections with Leonid Rozenberg, Hudson Rock’s Head of Partnerships & Integrations. To discover how
Introduction Hudson Rock recently shed light on how a compromised Citrix account without MFA was potentially used to deploy a devastating ransomware attack on Change Healthcare. This
This article aims to shed light on the identity behind a massive Discord spying tool and raise concerns about the possibility of private Discord data
In late February 2024 Change Healthcare suffered a devastating ransomware attack which led to major disruptions to the company’s platform, estimated at a staggering $872,000,000
In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range
Using the stolen account, the threat actor modified the AS number belonging to Orange’s IP address, resulting in major disruptions…
Infostealers are a type of malware designed to steal information from the victim system in order to send it to the attacker…
A hacker who goes by the username “irleaks” posted a thread in which they attempt to sell over 160,000,000 records of Iranians…
The Lumma Infostealer’s cookie restoration method operates by leveraging a key from restore files, allowing the revival of expired Google cookies…
Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups…
A threat actor attempts to sell access to a sensitive area of Binance — the major cryptocurrency exchange’s…
It is not uncommon for threat actors to exploit login data obtained from Infostealer infections to carry out various types of cyberattacks…
In the past few months, the Telegram clicker game Hamster Kombat has taken the world of cryptocurrency game enthusiasts by storm. Even though the gameplay,
Key Points Introduction Threat actors continually evolve their tactics to stay ahead of detection. Traditional methods of malware distribution via emails containing malicious attachments are
American cybersecurity company KnowBe4 says a person it recently hired as a Principal Software Engineer turned out to be a North Korean state actor who
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.