"Living Off the Land" attacks use built-in tools and processes instead of traditional malware.
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Microsoft reveals ClickFix campaign abusing Windows Terminal to deliver Lumma Stealer and steal browser credentials.
A precise approach to everyday Windows breakdowns.
China-linked CL-STA-1087 targets Southeast Asian militaries since 2020 using AppleChris and MemFun for espionage and credential theft.
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation ...
Those aren't toys. Malware used in a sophisticated spear-phishing and infostealing campaign by Russian bad actors includes a component dubbed BlackSanta that can shut down antivirus and EDR ...
Researchers uncovered an extensive cyberespionage campaign that used novel backdoors and familiar evasion techniques to maintain persistent access.
Crooks tweak familiar copy-paste ruse so that victims run malicious commands themselves A new twist on the long-running ...
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts.
Hackers are abusing Windows Terminal in a new ClickFix attack that installs Lumma Stealer and steals browser passwords while ...