Infostealer Logs Economy and Abuse in 2026
Analysis of the infostealer logs economy in 2026, covering credential harvesting, underground markets, and how stolen data fuels cybercrime operations.
Man-in-the-Middle (MitM) — Intercepting and Manipulating Communications in Transit
A Man-in-the-Middle (MitM) attack occurs when an attacker intercepts, monitors, or alters communication between two parties without their knowledge. This SECMONS glossary entry explains how MitM attacks work, common techniques, real-world impact, and how defenders should mitigate interception risks.
Phishing — Deceptive Social Engineering to Steal Credentials and Deliver Malware
Phishing is a social engineering technique where attackers impersonate trusted entities to steal credentials, deliver malware, or gain initial access. This SECMONS glossary entry explains phishing variants, operational impact, and defensive controls.
Infostealer Malware Trends and Campaigns in 2026
Analysis of infostealer malware activity in 2026, including delivery methods, data theft patterns, and how attackers monetize stolen information.
Snowflake Breach 2024: Cloud Data Theft Campaign
Investigative analysis of the Snowflake 2024 breach campaign involving credential theft and data exfiltration affecting multiple organizations using the cloud data platform.
CVE-2023-23397 — Microsoft Outlook NTLM Credential Leak Vulnerability
Technical analysis of CVE-2023-23397, a critical Microsoft Outlook vulnerability that allows attackers to capture NTLM credentials through specially crafted email messages.
Evolution of Phishing in Modern Cyber Attacks
Deep analysis of how phishing has evolved into advanced identity-driven attack techniques, including token theft, MFA bypass, and targeted social engineering campaigns.
Lumma Stealer Malware — Information-Stealing Malware Targeting Credentials and Crypto Wallets
Technical analysis of Lumma Stealer, a modern infostealer malware used to harvest browser credentials, authentication tokens, and cryptocurrency wallet data from infected systems.
Identity Threat Detection and Response (ITDR)
Identity Threat Detection and Response (ITDR) is a cybersecurity discipline focused on detecting, investigating, and responding to identity-based attacks such as credential abuse, privilege escalation, and account compromise.
RedLine Stealer Malware — Credential and Information Stealing Malware
Technical analysis of RedLine Stealer, a widely distributed information-stealing malware used to harvest credentials, browser data, and cryptocurrency wallets from infected systems.
Raccoon Stealer Malware — Credential and Cryptocurrency Wallet Stealing Malware
Technical analysis of Raccoon Stealer, an information-stealing malware widely used in cybercrime campaigns to harvest credentials, browser data, and cryptocurrency wallet information.
DarkGate Malware — Modular Malware Loader and Remote Access Platform
Technical analysis of DarkGate malware, a modular malware platform used to deliver additional payloads, perform credential theft, and maintain remote access to compromised systems.
Vidar Stealer Malware — Credential and Information Stealing Malware
Technical analysis of Vidar Stealer, a widely used information-stealing malware designed to harvest credentials, browser data, and cryptocurrency wallet information from infected systems.
FormBook Malware — Credential Stealer and Information-Stealing Malware
Technical analysis of FormBook malware, a widely distributed credential-stealing trojan used in phishing campaigns to harvest credentials, browser data, and system information.
Yahoo 2013 Data Breach: 3 Billion Accounts Exposed
Investigative analysis of the Yahoo 2013 breach, the largest known account compromise in internet history, examining how attackers obtained data belonging to roughly three billion users.
Infostealer Malware
Infostealer malware is a category of malicious software designed to harvest sensitive information such as credentials, browser data, financial records, and authentication tokens from compromised systems.
Credential Harvesting Attack Technique — Theft of Authentication Credentials
Technical explanation of credential harvesting, an attack technique used by threat actors to steal authentication credentials and gain unauthorized access to systems and networks.
Spyware: Covert Surveillance Malware Explained
Technical explanation of spyware malware, its behavior, infection vectors, surveillance capabilities, and the security risks associated with covert data collection.
Credential Dumping Attack Technique — Extracting Authentication Data from Compromised Systems
Technical explanation of credential dumping, an attack technique used by threat actors to extract stored authentication credentials from compromised systems in order to escalate privileges and move laterally within enterprise networks.