The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
An elusive adversary is attacking high-value targets with impunity using novel malware frameworks and custom-built backdoors.
Read More
An elusive adversary is attacking high-value targets with impunity using novel malware frameworks and custom-built backdoors.
Partially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.
A new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.
Crimeware vendors say 'macros are dead', but they have a new weapon to help threat actors successfully deploy malware.
The self-proclaimed 'oldest ransomware affiliate on the planet' has new tricks and new features and continues to beat enterprise defenses.
Learn how threat actors manipulate Windows to install malicious apps that are trusted by the system, and how to defend against them.
Chinese-linked phishing campaign seeks to compromise Russian targets with custom malware designed for espionage.
Targeting organizations in SE Asia and Australia, Aoqin Dragon uses pornographic-themed lures and custom backdoors to conduct espionage operations.
A new typosquatting attack against the PyPI repository targets enterprise Macs with a distinctive obfuscation method.
Software developers using GitLab CI are being targeted with malware through a typosquatting attack, putting downstream users at risk.