You are here |
intezer.com | ||
| | | |
blog.talosintelligence.com
|
|
| | | | Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims' host. | |
| | | |
www.welivesecurity.com
|
|
| | | | ESET Research uncovers BackdoorDiplomacy, a new APT group that mainly targets ministries in the Middle East and Africa and deploys a backdoor ESET calls Turian. | |
| | | |
www.genians.co.kr
|
|
| | | | APT37 used Dropbox to spread ZIP files with malicious LNK files that filelessly executed RoKRAT and triggered extra malware with the keyword 'toy'. | |
| | | |
www.lepide.com
|
|
| | This blog explains the 15 most common types of cyber-attacks and how you can mitigate them. |