User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
Users Targeted by Lone None Stealer via Fake Copyright Phishing
Sophisticated phishing leverages DLL side-loading and clipboard hijacking, enabling silent cryptocurrency diversion and data exfiltration from unsuspecting users.
Global Phishing-as-a-Service Dismantled, Targeting Microsoft 365 Credentials
Phishing-as-a-Service proliferation enables widespread credential theft, posing immediate risk to user accounts and organizational data.
Browser Vulnerability Exposes Crypto Wallets to Remote Theft
A critical type confusion vulnerability in Chromium's V8 engine permits remote code execution, directly threatening locally stored digital asset keys.
Chrome V8 Engine Vulnerability Exposes Crypto Wallets to Website Attacks
A critical "Type Confusion" bug in Chrome's V8 engine enables remote code execution, allowing attackers to drain crypto wallets via malicious websites.
U.S. Exchange Breached via Outsourcing Firm Social Engineering
Sophisticated social engineering against third-party vendors exposes exchanges to supply chain attacks, enabling significant asset exfiltration.
