Explore >> Select a destination


You are here

intezer.com
| | blog.talosintelligence.com
8.5 parsecs away

Travel
| | Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims' host.
| | www.welivesecurity.com
9.5 parsecs away

Travel
| | ESET Research uncovers BackdoorDiplomacy, a new APT group that mainly targets ministries in the Middle East and Africa and deploys a backdoor ESET calls Turian.
| | www.genians.co.kr
9.5 parsecs away

Travel
| | APT37 used Dropbox to spread ZIP files with malicious LNK files that filelessly executed RoKRAT and triggered extra malware with the keyword 'toy'.
| | www.lepide.com
65.4 parsecs away

Travel
| This blog explains the 15 most common types of cyber-attacks and how you can mitigate them.