• Home
  • AI Hub
    • AI Tools
    • Generative Art
    • Prompts
  • Software
    • Windows / Mac
    • Android
    • Design Assets
  • IT & Security
    • Cybersecurity
    • Networking
    • Systems Admin
    • Virtualization
  • Programming
    • Web Development
    • Mobile Development
    • Programming Languages
    • DevOps
  • Hardware
    • PC Building
    • HomeLab
    • Peripherals
  • Career
    • Freelancing
    • Remote Work
    • Certifications
  • Tech News
    • Breakthroughs
    • Industry Updates
    • Security Alerts
BOOMBOX COMMUNITY
  • Trending
    • Animals
    • Photography
    • Extreme
    • Travel
  • Hot
    • Gif
    • Videos
  • Popular
    • nsfw
sections
  • Home
  • AI Hub
  • IT & Security
  • Programming
  • Hardware
  • Software
  • Career
  • Tech News
BOOMBOX COMMUNITY

DigiGlitch

DigiGlitch

  1. Home
  2. IT & Security
  3. Malware

Malware

Recent
  • Most Voted
  • Most Viewed
  • Most Discussed
  • Recent
  • Featured
  • Random
DynoWiper Malware Targets Polish Power Sector in Sandworm Attack
30

DynoWiper Malware Targets Polish Power Sector in Sandworm Attack

by Marcus K.
New Osiris Ransomware Leverages POORTRY for BYOVD Attack
50

New Osiris Ransomware Leverages POORTRY for BYOVD Attack

by Marcus K.
Security Flaw Exposes StealC Malware Operations to Researchers
20

Security Flaw Exposes StealC Malware Operations to Researchers

by Marcus K.
  • 20
    Cybersecurity, Industry Updates, IT & Security, Malware, Tech News

    Tudou Marketplace Suspends Telegram Transactions Amid Controversy

    The decline of Tudou Guarantee, a major Telegram-based illicit marketplace, underscores the fragility of cyber fraud ecosystems. As law enforcement intensifies scrutiny, the potential for...

    Marcus K.
    by Marcus K. 2 months ago2 months ago
  • 20
    Cybersecurity, IT & Security, Malware, Programming, Software Development

    North Korean Hackers Exploit VS Code Projects to Target Developers

    North Korean threat actors are exploiting Microsoft Visual Studio Code projects to deploy sophisticated backdoors, manipulating developer workflows for malicious gains. This evolution in tactics...

    25% off Malwarebytes Premium
    Marcus K.
    by Marcus K. 2 months ago2 months ago
  • 40
    Cybersecurity, Industry Updates, IT & Security, Malware, Tech News

    Black Basta Ransomware Leader Faces EU and INTERPOL Pursuit

    Ukrainian and German authorities have identified key members of the Black Basta ransomware group, including its Russian leader, Oleg Nefedov. Despite law enforcement's efforts, the...

    25% off Malwarebytes Premium
    Marcus K.
    by Marcus K. 2 months ago2 months ago
  • 20
    IT & Security, Malware

    GootLoader Malware Exploits ZIP Archives for Evasion

    The emergence of GootLoader, leveraging malicious ZIP archives, underscores a critical vulnerability in automated detection systems. By employing techniques like hashbusting, attackers ensure each payload...

    25% off Malwarebytes Premium
    Marcus K.
    by Marcus K. 2 months ago2 months ago
  • 40
    IT & Security, Malware, Network Security, Security Alerts, Tech News

    Researchers Neutralize 550 Kimwolf and Aisuru Command Servers

    The rise of the AISURU/Kimwolf botnets represents a troubling evolution in cybercrime, leveraging millions of compromised Android devices as unknowing participants in DDoS attacks. This...

    25% off Malwarebytes Premium
    DigiGlitch News Desk
    by DigiGlitch News Desk 2 months ago2 months ago
  • 20
    Cybersecurity, IT & Security, Malware, Security Alerts, Tech News

    Ransomware Groups Exploit Compliance Violations for Extortion

    Ransomware actors have shifted tactics, targeting compliance gaps alongside data breaches. This "compliance extortion" intensifies pressure on businesses, forcing them to navigate between hefty ransom...

    25% off Malwarebytes Premium
    DigiGlitch News Desk
    by DigiGlitch News Desk 2 months ago2 months ago
  • 10
    Cybersecurity, IT & Security, Malware, Security Alerts, Tech News

    Malicious Chrome Extension Compromises MEXC API Keys

    A malicious Chrome extension, disguised as a trading tool for MEXC, exploits authenticated sessions to steal API keys with withdrawal permissions. This breach not only...

    25% off Malwarebytes Premium
    DigiGlitch News Desk
    by DigiGlitch News Desk 2 months ago2 months ago
  • 130
    Cybersecurity, IT & Security, Malware, Security Alerts, Tech News

    Hotel Staff Targeted by Fake Booking Email Scam

    Cybercriminals are exploiting trusted brands through the PHALT#BLYX campaign, employing deceptive lures that mimic Booking.com communications to deploy the DCRat remote access trojan. This multi-stage...

    Norton AntiVirus Plus 50% OFF
    Samuel S. Thorn
    by Samuel S. Thorn 2 months ago2 months ago
  • 30
    Cybersecurity, IT & Security, Malware, Security Alerts, Tech News

    Russia-Aligned Hackers Exploit Viber Against Ukraine’s Defense

    The UAC-0184 threat actor's use of the Viber platform to deliver malicious ZIP files underscores a troubling evolution in cyber warfare tactics. By exploiting widely-used...

    25% off Malwarebytes Premium
    Samuel S. Thorn
    by Samuel S. Thorn 2 months ago2 months ago
  • 40
    IT & Security, Malware, Security Alerts, Tech News, Vulnerabilities

    RondoDox Botnet Exploits React2Shell in Massive Attack Wave

    The RondoDox botnet is actively exploiting the critical React2Shell vulnerability (CVE-2025-55182), targeting IoT devices and web applications at scale. With more than 84,000 exposed instances,...

    Samuel S. Thorn
    by Samuel S. Thorn 2 months ago2 months ago
  • 40
    IT & Security, Malware, Security Alerts, Tech News

    VVS Stealer Targets Discord Accounts via Telegram

    VVS Stealer, now circulating on Telegram, uses advanced Python obfuscation to steal Discord credentials while evading detection. Users and admins must act immediately, implementing strong...

    NordVPN - Holiday deal: 74% off + 3 extra months
    Samuel S. Thorn
    by Samuel S. Thorn 2 months ago2 months ago
  • 50
    Cybersecurity, IT & Security, Malware, Security Alerts, Tech News

    North Korean Hackers Steal $2.7B in Crypto in Record-Breaking 2025 Attacks

    North Korean state-sponsored hackers have executed record-breaking crypto thefts, stealing $2.7 billion in 2025 alone, with a staggering $1.4 billion from Bybit. This ongoing threat...

    25% off Malwarebytes Premium
    Samuel S. Thorn
    by Samuel S. Thorn 2 months ago2 months ago
Creator Exclusive

Cinematic AI
Video Is Here

Generate broadcast-quality video from text. Claim 5,000 Bonus Credits (50% Off) today.

Get 50% Bonus Credits →

Trending

  • 1

    iPhone Battery Life: Adjust Display Settings Wisely

  • 2

    Samsung Galaxy S26 Ultra: Key Innovations Unveiled.

  • 3

    5 Essential Trends in AI: Transforming Labor by 2026

  • 4

    10 Urgent Security Flaws Exposed: Protect Your Game Servers Now

  • 5
    WhatsApp Vulnerability Exposes Messages, Accounts to Theft Risks

    WhatsApp Vulnerability Exposes Messages, Accounts to Theft Risks

original ad 300

Find Us On

  • DynoWiper Malware Targets Polish Power Sector in Sandworm...

    DynoWiper Malware Targets Polish Power Sector in Sandworm...

  • Apple iPhone Thrives Amidst Stagnant Indian Market

    Apple iPhone Thrives Amidst Stagnant Indian Market

  • Samsung Galaxy S26 Rumors: Worthy of Skepticism?

    Samsung Galaxy S26 Rumors: Worthy of Skepticism?

  • Google Photos’ New Feature: Meme Functionality Critiqued

    Google Photos’ New Feature: Meme Functionality Critiqued

  • Microsoft Warns of Targeted Phishing Attacks on Energy...

    Microsoft Warns of Targeted Phishing Attacks on Energy...

  • Substack’s TV App: A Distraction from Core Issues

    Substack’s TV App: A Distraction from Core Issues

  • Microsoft 365 and Outlook Face Widespread Outage Issues

    Microsoft 365 and Outlook Face Widespread Outage Issues

  • Leverage AI agents to boost your AWS strategy today.
    Voice AI Engine LiveKit Reaches $1B Valuation

    Voice AI Engine LiveKit Reaches $1B Valuation

  • New Osiris Ransomware Leverages POORTRY for BYOVD Attack

    New Osiris Ransomware Leverages POORTRY for BYOVD Attack

  • Ring Introduces New Content Verification Feature for Videos

    Ring Introduces New Content Verification Feature for Videos

  • Budget Fitness Tracker Challenges Whoop’s Market Dominance

    Budget Fitness Tracker Challenges Whoop’s Market Dominance

  • Snapchat’s Parental Controls: A Surveillance Dilemma

    Snapchat’s Parental Controls: A Surveillance Dilemma

  • Automated Attacks Compromise FortiCloud SSO Security Protocols

    Automated Attacks Compromise FortiCloud SSO Security Protocols

  • GoPro Hero 13 Black: Evaluating its Market Position

    GoPro Hero 13 Black: Evaluating its Market Position

  • Apple Set to Launch Gemini-Powered Siri in February

    Apple Set to Launch Gemini-Powered Siri in February

  • Unlocking ChatGPT’s Creativity: A Technical Examination

    Unlocking ChatGPT’s Creativity: A Technical Examination

  • Gmail’s Spam Misclassification Issues Persist Despite Updates

    Gmail’s Spam Misclassification Issues Persist Despite Updates

  • NexPhone Launch: A Potential Game Changer for 2026

    NexPhone Launch: A Potential Game Changer for 2026

// MISSION_ESSENTIALS
  • KLING AI Generative Video
  • HOSTINGER Web Infrastructure
  • NORD VPN Network Defense
  • ELEVENLABS Voice Synthesis
VIEW FULL LOADOUT →

Join DIGIGLITCH Community

Boombox Footer Logo
// SYSTEM_DIRECTORIES
  • [ HARDWARE ] Benchmarks & Stress Tests
  • [ SYNTHESIS ] Generative AI & Prompts
  • [ SECURITY ] Privacy & NetSec
  • [ INFRASTRUCTURE ] Web Hosting & Servers
  • Home
  • About Us
  • Terms
  • Privacy
  • Contact Us
© 2026 All Rights Reserved

log in

[nextend_social_login]

Captcha!
Forgot password?

forgot password

Back to
log in