Cyber Espionage | Phishing AttacksĀ | U.S.-China Relations APT41 hackers targeting US trade officials as talks with China approach
Phishing TechniquesĀ | Targeted Industries | Two-Factor Authentication BypassĀ New phishing tool Salty2FA bypasses two-factor authentication
Cybersecurity Incident | Data Protection MeasuresĀ | Ransomware Attack Croatian research institute targeted by ToolShell ransomware attack
Advanced Persistent ThreatsĀ | Cybersecurity Threats | Malware Distribution TechniquesĀ Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cyber Warfare | Malware Development | Phishing AttacksĀ UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware
Cyber Attacks | Espionage ActivitiesĀ | Malware Families CERT-UA alerts about malware attacks delivered through HTA files, utilizing court summons as bait.
Cybersecurity Threats | Malware Delivery Techniques | Remote Access ToolsĀ A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.