|
You are here |
blog.talosintelligence.com | ||
| | | | |
www.anomali.com
|
|
| | | | | This whitepaper examines a campaign believed to be conducted by China-based threat group, Mustang Panda. Read the paper from Anomali Threat Research. | |
| | | | |
cyble.com
|
|
| | | | | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns. | |
| | | | |
www.proofpoint.com
|
|
| | | | | Learn how to defend yourself from the Voldemort malware campaign's espionage with Proofpoint. Protect yourself from Chinese spyware threats. | |
| | | | |
blog.nuculabs.de
|
|
| | | Hello and welcome to Nucu Labs agent! We've been contracted by some external contractors to help them break..., I mean, assist them in making their life easier with their "competition". We obtained their competition's software from a poorly configured AWS server. Their competition, X, uses the software in order to setup a private communication channel to their servers, the software is simple, it fires up a server, listens on a port and waits for the right password, when the right password is entered, the server remembers the client and stops asking for passwords, simple. | ||