Phishing campaigns target Taiwan with Winos 4.0 malware
Analysis of domain registration data indicates that the threat actors are using a rotating set of domains and cloud hosting services to deliver malware.
3 min read
Cybersecurity Help is a global vulnerability intelligence provider. We monitor vulnerabilities in software from 60,000+ vendors and help customers prevent potential data breaches by addressing them proactively.
Request DemoAnalysis of domain registration data indicates that the threat actors are using a rotating set of domains and cloud hosting services to deliver malware.
3 min readThis marks the first time the Medusa ransomware has been linked to North Korean threat actors.
2 min readThe observed campaign deploys a five-stage infection chain installing a native C implant designed for persistence and lateral movement.
4 min readThe attack begins with social engineering lures promoting free premium software, including pirated office productivity suite installers.
2 min readOleksandr Didenko stole the identities of US citizens and sold them to overseas IT workers through the UpWorkSell online platform.
3 min read