“It comes to us as no surprise that this type of intelligence agency-grade malware would eventually fall into cybercriminals’ hands,” Sentinel Labs states. “Gyges is an early example of how advanced techniques and code developed by governments for espionage are effectively being repurposed, modularized and coupled with other malware to commit cybercrime.”
Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.
Read more about Cyber Security
- What is Next Generation Endpoint Protection?
- 7 Ways Hackers Steal Your Passwords
- EDR vs Antivirus: What’s the Difference?
- Mastering Endpoint Security | A CISO’s Blueprint for Resilience
- The Strategic CISO | How Risk Management Fundamentals Lead to Success
- The Future of CIO and CISO Roles in the Era of AI