The malware, discovered by Proofpoint and Team Cymru, was mainly utilized by initial access brokers

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

IBM: Identity Compromises Surge as Top Initial Access Method for Cybercriminals

February 21, 2024 0 Comments 0 tags

Compromising valid identities became the top initial access vector in 2023 while phishing dropped to second place, IBM found in a new report

Biden Warns Chinese Cars Could Steal US Citizens’ Data

March 1, 2024 0 Comments 0 tags

President Biden warned that connected vehicles built in China could be used to steal sensitive data of US citizens and critical infrastructure

Chinese Hackers Target ASEAN Entities in Espionage Campaign

March 27, 2024 0 Comments 0 tags

Palo Alto Networks’ Unit 42 observed two Chinese-affiliated APT groups recently conducting cyber espionage campaigns targeting ASEAN organizations