Explore >> Select a destination


You are here

blog.talosintelligence.com
| | cyble.com
9.3 parsecs away

Travel
| | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns.
| | lab52.io
9.4 parsecs away

Travel
| | The Lab52 team has analysed a cyber campaign in which attackers deploy a new variant of the PlugX malware. Both the infection chain and the various artefacts used in the cyberattack share multiple similarities with the SmugX campaign, attributed to threat actors Red Delta and Mustang Panda, allegedly linked to the Chinese government.
| | www.seqrite.com
9.2 parsecs away

Travel
| | Seqrite Labs uncovers Silent Lynx, a new APT group targeting government entities in Kyrgyzstan and neighboring nations. This in-depth analysis explores their campaigns, including malicious ISO files, C++ loaders, PowerShell scripts, and Golang implants, leveraging Telegram for command and control.
| | www.picussecurity.com
30.5 parsecs away

Travel
| Kubernets disclosed four critical vulnerabilities affecting Ingress NGINX. Check out this blog to learn how the CVE-2025-1974 exploits work.