Cyber Espionage | Phishing Attacks | U.S.-China Relations APT41 hackers targeting US trade officials as talks with China approach
Phishing Techniques | Targeted Industries | Two-Factor Authentication Bypass New phishing tool Salty2FA bypasses two-factor authentication
Cybersecurity Incident | Data Protection Measures | Ransomware Attack Croatian research institute targeted by ToolShell ransomware attack
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cyber Warfare | Malware Development | Phishing Attacks UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware
Cyber Attacks | Espionage Activities | Malware Families CERT-UA alerts about malware attacks delivered through HTA files, utilizing court summons as bait.
Cybersecurity Threats | Malware Delivery Techniques | Remote Access Tools A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.