The attackers used process hollowing against RegAsm.exe, patched Windows defenses such as AMSI and ETW and unpacked further ...
Researchers at Cisco Talos have uncovered a sophisticated cyberespionage campaign tied to Chinese-speaking advanced ...
Security researchers Bitdefender discovered a major malvertising campaign on Meta’s network after threat actors managed to ...
ShadowV2 botnet exploits AWS Docker flaws using Python C2 and Go RAT, enabling sophisticated DDoS-for-hire attacks.
PlugX is a modular remote access trojan (RAT) widely used by many China-aligned hacking groups, but most prominently by Mustang Panda (aka BASIN, Bronze President, Camaro Dragon, Earth Preta, ...
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
North Korean-linked crews connected to the pervasive IT worker scams have upped their malware game, using more advanced tools ...
The RevengeHotels case demonstrates how cybercrime is evolving rapidly in an era of AI-driven tools. While hotels are the ...
ESET Research released a deep dive report into the activities of the DeceptiveDevelopment threat group and North Korean IT workers, which are considered tightly bound.The analyzed campaigns rely ...
Chinese epionage group has compromised US defense contractors and various other organizations in the Americas, Europe, Asia, ...
The ShadowV2 DDoS operation, discovered by Darktrace, uses a command-and-control framework hosted on GitHub CodeSpaces, a ...