Cloud Security Threats | Cyber Espionage | Vulnerability Exploitation Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications
Cyber Espionage | Malware Delivery | Spear-Phishing Attacks North Korean hackers target diplomats via GitHub spearphishing attack
Credential Theft | Cyber Espionage | Malware Persistence New APT group ‘Curly COMrades’ targeting Georgia and Moldova
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.