 
      
    | You are here | blog.talosintelligence.com | ||
| | | | | cyble.com | |
| | | | | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns. | |
| | | | | lab52.io | |
| | | | | The Lab52 team has analysed a cyber campaign in which attackers deploy a new variant of the PlugX malware. Both the infection chain and the various artefacts used in the cyberattack share multiple similarities with the SmugX campaign, attributed to threat actors Red Delta and Mustang Panda, allegedly linked to the Chinese government. | |
| | | | | www.seqrite.com | |
| | | | | Seqrite Labs uncovers Silent Lynx, a new APT group targeting government entities in Kyrgyzstan and neighboring nations. This in-depth analysis explores their campaigns, including malicious ISO files, C++ loaders, PowerShell scripts, and Golang implants, leveraging Telegram for command and control. | |
| | | | | www.picussecurity.com | |
| | | Kubernets disclosed four critical vulnerabilities affecting Ingress NGINX. Check out this blog to learn how the CVE-2025-1974 exploits work. | ||