|
You are here |
www.proofpoint.com | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims' host. | |
| | | | |
thehackernews.com
|
|
| | | | | Oil & gas companies beware! Hackers are using the updated Rhadamanthys info-stealer in phishing attacks. | |
| | | | |
www.trendmicro.com
|
|
| | | | | While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer. | |
| | | | |
thehackernews.com
|
|
| | | EDRKillShifter, a new tool linked to RansomHub ransomware, targets EDR software, posing a growing threat to endpoint security. | ||