researchers
-
Gootkit Malware Continues to Evolve with New Components and Obfuscations
Cyber Threat / Malware The threat actors associated with the Gootkit malware have made “notable changes” to their toolset, adding…
Read More » -
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
Threat Response / Cyber Crime Cybersecurity researchers have discovered the real-world identity of the threat actor behind Golden Chickens malware-as-a-service,…
Read More » -
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
Endpoint Security / Malware Cybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable USB…
Read More » -
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
Nation-State-Sponsored Attacks The U.K. National Cyber Security Centre (NCSC) on Thursday warned of spear-phishing attacks mounted by Russian and Iranian…
Read More » -
Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation
Threat Analysis Google on Thursday disclosed it took steps to dismantle over 50,000 instances of activity orchestrated by a pro-Chinese…
Read More » -
PY#RATION: New Python-based RAT Uses WebSocket for C2 and Data Exfiltration
Threat Detection / Endpoint Security Cybersecurity researchers have unearthed a new Python-based attack campaign that leverages a Python-based remote access…
Read More » -
Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection
Cyber Espionage / Golang Organizations in East Asia are being targeted by a likely Chinese-speaking actor dubbed DragonSpark while employing…
Read More » -
Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks
Threat Detection / Infosec The legitimate command-and-control (C2) framework known as Sliver is gaining more traction from threat actors as…
Read More » -
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
Firewall / Network Security A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a…
Read More » -
Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa
Cyber Threat / Malware An ongoing campaign dubbed Earth Bogle is leveraging geopolitical-themed lures to deliver the NjRAT remote access…
Read More »