Who Needs Macros? | Threat Actors Pivot to Abusing Explorer and Other LOLBins via Windows Shortcuts
Crimeware vendors say 'macros are dead', but they have a new weapon to help threat actors successfully deploy malware.
Read More
Crimeware vendors say 'macros are dead', but they have a new weapon to help threat actors successfully deploy malware.
The self-proclaimed 'oldest ransomware affiliate on the planet' has new tricks and new features and continues to beat enterprise defenses.
Learn how threat actors manipulate Windows to install malicious apps that are trusted by the system, and how to defend against them.
Chinese-linked phishing campaign seeks to compromise Russian targets with custom malware designed for espionage.
Targeting organizations in SE Asia and Australia, Aoqin Dragon uses pornographic-themed lures and custom backdoors to conduct espionage operations.
A new typosquatting attack against the PyPI repository targets enterprise Macs with a distinctive obfuscation method.
Software developers using GitLab CI are being targeted with malware through a typosquatting attack, putting downstream users at risk.
Visualizing data is integral to threat research. See how we used this timeline analysis tool to track activity in the Ukrainian cyber conflict.
Two high-severity flaws in popular end user security tools allow attackers to elevate privileges and compromise devices.
Chinese-aligned APT group Moshen Dragon caught sideloading malware through multiple AV products to infect telecoms sector.