Today > 5 Critical | 6 High | 28 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This comprehensive report analyzes Gomorrah Stealer, a sophisticated malware designed to exfiltrate sensitive information from compromised systems. It operates within a malware-as-a-service framework and targets data from web browsers, cryptocurrency wallets, VPNs, and configuration files. The stea…