Summary| Cybersecurity and Infrastructure Security Agency CISA
Learn how industrial-scale phishing kits use domain impersonation to scam people, plus defense strategies and takedown success stories.| CybelAngel
Microsoft and Europol dismantled Lumma’s 2,300-domain C2 network after 10M infections tied to credential and crypto theft.| The Hacker News
Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft, partnering with others across industry and international law enforcement, facilitated the disruption of Lumma infrastructure.| Microsoft Security Blog
Malware Lumma Stealer znalazło się na celowniku skoordynowanej operacji na niespotykaną skalę.| AVLab.pl
はじめに InfoStealer (インフォスティーラー) とは、情報を窃取することを目的としたマルウェアの総称です。このマルウェアが盗む情報は、認証情報、金融情報、ブラウザの閲覧履歴やオー...| IIJ Security Diary