Cybersecurity Threats | Data Exfiltration | Malware Techniques Russian cyberespionage group APT28 targets NATO member firms with Outlook “NotDoor” backdoor
Cybersecurity Threats | Malware Techniques | Targeted Attacks Transparent Tribe spear-phishing Indian government using weaponised desktop shortcuts
Advanced Persistent Threats | Cybersecurity Threats | Malware Techniques Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools
Cybersecurity Threats | Global Espionage | Malware Techniques Advanced DevilsTongue Windows spyware monitors users around the world.
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cybercrime | Data Theft | Malware Techniques A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.