Credential Theft
461 article(s)
🗓 16 Apr 2026 · 👤 LOGICFALCON
Hackers rapidly exploited a Marimo Python notebook vulnerability to spread the NKAbuse malware through Hugging Face Spaces, targeting credentials and cloud infrastructure. Here’s how the attack unfolded and why AI platforms are now in the crosshairs.
🗓 16 Apr 2026 · 👤 TRUSTBREAKER · 🌍 North America
A flaw in Windows Snipping Tool let attackers steal authentication hashes with a single click. Learn how deep link abuse enabled silent credential leaks and why immediate patching is crucial.
🗓 16 Apr 2026 · 👤 LOGICFALCON
NWHStealer is a stealthy new malware distributed via fake VPN sites and gaming mods. It targets browser data, credentials, and cryptocurrency wallets, using advanced evasion techniques. Here’s how the campaign works—and how you can stay safe.
🗓 16 Apr 2026 · 👤 TRUSTBREAKER
A new malware campaign uses fake VPN and game mod websites to distribute NWHStealer, a Windows infostealer targeting browser credentials and cryptocurrency wallets. Attackers exploit trusted brands and platforms, making vigilance crucial for users.
🗓 16 Apr 2026 · 👤 LOGICFALCON
Hiring virtual assistants can supercharge productivity, but failing to secure their access can open the door to data breaches, social engineering, and legal headaches. Here’s how to protect your business from the hidden cyber risks.
🗓 15 Apr 2026 · 👤 TRUSTBREAKER · 🌍 Europe
AgingFly is a newly discovered malware targeting Ukraine’s government and healthcare sectors. Using stealthy phishing campaigns and on-demand attack modules, it steals credentials from browsers and WhatsApp, evading traditional defenses.
🗓 15 Apr 2026 · 👤 LOGICFALCON
More than 100 Chrome extensions have been caught stealing user data and creating browser backdoors in a covert operation affecting over 20,000 users. Learn how attackers used legitimate-looking add-ons to compromise security and why vigilance is crucial.
🗓 15 Apr 2026 · 👤 TRUSTBREAKER
HIPPO is a radical new password system that generates unique, strong passwords for every site—without ever storing them. Learn how HIPPO works, its security benefits, and the risks of this cryptographic approach.
🗓 15 Apr 2026 · 👤 LOGICFALCON · 🌍 Europe
More than 100 malicious Chrome extensions have been found stealing Google account tokens, hijacking Telegram sessions, and injecting ads. Learn how this campaign works, its ties to Russian cybercrime, and what Chrome users should do now.
🗓 14 Apr 2026 · 👤 TRUSTBREAKER
As credential theft rises, Zero Trust has become the essential strategy to protect identity. But only a focused, identity-first approach can close the gaps hackers exploit. This feature investigates how Zero Trust, applied right, changes the breach game.
1  
2  
3  
4  
5  
Next »