A complex malware loader, which encrypts stages of code to bypass security systems, has been infecting Windows systems since early 2022. It works through a three-step process to distribute dangerous payloads, including remote access trojans. ThreatRay researchers found a signature within the third stage that allows them to identify the malware. It is not a new malware but is significant due to its sophistication and constant evolution.

Rust-Based Luca Stealer Spreads Across Linux and Windows Systems
Threat actors are increasingly abandoning traditional languages like C and C++ in favor of modern alternatives such as Golang, Rust, and Nim. This strategic shift


