Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.