RIP APT34: Russian spies penetrated OilRig infrastructure to deploy malware
Turla APT conducted hostile takeover of servers belonging to a rival hacking group called OilRig.
Turla APT conducted hostile takeover of servers belonging to a rival hacking group called OilRig.
The attackers infect victims’ devices with the highly invasive malware that is hidden inside repackaged legitimate applications.
WSH RAT is basically identical to H-Worm and its name is likely a reference to the legitimate Windows Script Host.
In new version of Echobot its operators added exploits for AirOS, Asmax, DD-WRT, D-Link, Linksys, Seowon Intech, Yealink and Zeroshell products.
Millions of Exim email servers are currently under attack.
FIN8 made several improvements to its malware arsenal, fixing bugs and making the malicious tools harder to detect.
Trend Micro’s researchers shed light on some of the activity involving CVE-2019-2725.
Chinese APT crew ICEFOG is back online.
The group has been leveraging malicious documents and files to target telecommunications organizations and impersonate government entities.
The flaw affects Exim installations running versions 4.87 to 4.91.
Showing elements 3951 - 3960