Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#data-exfiltration

Diagram illustrating the modular architecture of the evolved Gremlin stealer, highlighting new evasion techniques and data collection modules.
Ransomware & Malware

Gremlin Stealer Evolves: 0 Detections for New Data Site [Threat Analysis]

Twelve months. That's how long it took for a basic credential harvesting tool to morph into a sophisticated, modular threat. Gremlin stealer's latest iteration is actively sidestepping static analysis, leaving security teams scrambling.

5 min read 1 week ago
Diagram showing interconnected IT zones with an arrow indicating faster threat movement
Threat Intelligence

Beyond the Endpoint: Are We Safe?

Threat actors are now exfiltrating data at speeds that should make CISOs sweat. The old way of looking at just endpoints is dead.

4 min read 3 weeks ago
Digital visualization of data streams being exfiltrated by Trigona ransomware's custom uploader tool
Ransomware & Malware

[Trigona Ransomware] Custom Exfiltration Tool Speeds Up Data Theft

Imagine a thief who doesn't just grab your wallet—he's got a custom vacuum sucking out your entire safe in parallel streams, dodging every alarm. That's Trigona ransomware's latest move with a bespoke exfiltration tool.

4 min read 4 weeks, 1 day ago
A stylized padlock with data flowing out of it into a cloud icon, representing data exfiltration.
Ransomware & Malware

Ransomware's New Trick: Stealing Data with Your Own Tools

Forget the shadowy FTP servers. The latest wave of ransomware is quietly using your company's own cloud tools to siphon off sensitive data. This isn't just sloppy; it's strategically terrifying.

6 min read 1 month, 1 week ago
Data streams leaking from ChatGPT interface through hidden channel to external server
Cloud Security

ChatGPT's Secret Backdoor: Your Private Chats Are Leaking Out

Imagine spilling your medical history or tax secrets to ChatGPT, only for it to quietly beam them to a hacker's server. That's not sci-fi—it's happening right now through a sneaky flaw in its code sandbox.

5 min read 1 month, 1 week ago
Screenshot of malicious Invoice540.pdf exploiting Adobe Reader zero-day on VirusTotal
Vulnerabilities & CVEs

Adobe Reader Zero-Day Powers Sneaky PDF Attacks on Oil Pros Since Late 2025

Fake invoices disguised as Russian oil payments have been slipping through defenses, exploiting an unpatched Adobe Reader zero-day since late 2025. Security pros spotted the first traces on VirusTotal, but the real damage? It's already underway.

5 min read 1 month, 1 week ago
Illustration of Grafana dashboard with hidden prompt injection attack leaking data to hacker server
Vulnerabilities & CVEs

Grafana's AI Feature Was One Sneaky Web Page Away from Spilling Secrets

Picture your AI dashboard gobbling up hidden hacker commands from a shady webpage, then dutifully shipping your secrets back home. Grafana just patched that exact nightmare.

6 min read 1 month, 2 weeks ago
Diagram showing chunked data packets bypassing firewall App-ID detection during exfiltration
Vulnerabilities & CVEs

Hackers Are Chunking Data to Dodge Your Next-Gen Firewall's App-ID Trap

Ever wonder why your shiny next-gen firewall lets the first 5KB of hacker traffic sail through? It's not a bug—it's the feature killing your data exfiltration defenses.

5 min read 1 month, 2 weeks ago
ChatGPT interface with leaking data visualization and warning icons
Compliance & Policy

ChatGPT's One-Prompt Data Heist: Your Secrets Just Got Leaky

Imagine spilling your medical history to ChatGPT, only for a hidden prompt to beam it to some hacker's server. That's not sci-fi—it's what just happened, and it exposes how flimsy these AI guards really are.

4 min read 1 month, 2 weeks ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details