Click, and boom, your network is compromised. All a hacker needs is one successful exploit and you could have a very bad day. Recently we uncovered one artifact that we would like to break down and ...
Threat analysts have discovered a new obfuscation technique used by the Hive ransomware gang, which involves IPv4 addresses and a series of conversions that eventually lead to downloading a Cobalt ...
A new stealthy Linux malware known as Shikitega has been discovered infecting computers and IoT devices with additional payloads. The malware exploits vulnerabilities to elevate its privileges, adds ...
AT&T researchers have discovered a new Linux malware that can bypass multi-stage deployment. The malware known as Shiketega can bypass antivirus by using a polymorphic encoder that makes static ...
North Korean hackers are using a trojanized version of the PuTTY and KiTTY SSH utility to install backdoors on targets’ devices. The attack begins with the threat actors sending phishing emails to ...
A campaign by APT37 used a sophisticated malware to steal information about sources , which appears to be a successor to Bluelight. Sophisticated hackers believed to be tied to the North Korean ...
Malware exists in different flavors. Most of the time, malware consists of malicious files stored in computers operating systems, just like any other file, and running as software with or without high ...