Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Persistence 

Advanced DevilsTongue Windows spyware monitors users around the world.
Cybersecurity Threats | Global Espionage  | Malware Techniques 

Advanced DevilsTongue Windows spyware monitors users around the world.

The Akira ransomware employs Windows drivers to evade antivirus and endpoint detection and response systems during attacks on SonicWall.
Evasion Techniques | Exploitation of Vulnerabilities | Ransomware Tactics

The Akira ransomware employs Windows drivers to evade antivirus and endpoint detection and response systems during attacks on SonicWall.

CERT-UA alerts about malware attacks delivered through HTA files, utilizing court summons as bait.
Cyber Attacks | Espionage Activities  | Malware Families

CERT-UA alerts about malware attacks delivered through HTA files, utilizing court summons as bait.

SafePay ransomware has compromised over 260 victims in various nations.
Cybersecurity

SafePay ransomware has compromised over 260 victims in various nations.

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.
Cybersecurity

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search