You are here |
blog.talosintelligence.com | ||
| | | |
www.welivesecurity.com
|
|
| | | | ESET researchers uncover an active malicious campaign in Latin America that uses new versions of old malware, Bandook, to spy on its victims. | |
| | | |
www.seqrite.com
|
|
| | | | Seqrite Labs uncovers Silent Lynx, a new APT group targeting government entities in Kyrgyzstan and neighboring nations. This in-depth analysis explores their campaigns, including malicious ISO files, C++ loaders, PowerShell scripts, and Golang implants, leveraging Telegram for command and control. | |
| | | |
www.huntandhackett.com
|
|
| | | | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post. | |
| | | |
cyble.com
|
|
| | Cyble analyzes stealthy and sophisticated malware capable of bypassing Chrome's app-bound encryption via dual injection techniques. |