Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics 

SecurityVendor

In this blog entry, Trend™ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data.Trend Micro Research, News and PerspectivesRead More