Proofpoint has uncovered a new cyber-espionage campaign deploying new malware dubbed “Voldemort” This article has been indexed from...
Vous n'êtes pas connecté
Researchers from Proofpoint have uncovered a sophisticated cyberattack campaign leveraging Google Sheets as a command and control (C2) platform. Dubbed “Voldemort” by the researchers, this campaign targets Windows users globally, employing a novel attack chain that combines both common and…
Proofpoint has uncovered a new cyber-espionage campaign deploying new malware dubbed “Voldemort” This article has been indexed from...
Proofpoint has uncovered a new cyber-espionage campaign deploying new malware dubbed “Voldemort” This article has been indexed from...
North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems...
North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems...
An investigation by the Cyble Research and Intelligence Lab (CRIL) has uncovered a sophisticated cyberattack aimed at Malaysian political figures and...
In a newly uncovered advanced malware campaign, threat actors are using a complex, fileless approach to deliver the Remcos Remote Access Trojan (RAT),...
In a newly uncovered advanced malware campaign, threat actors are using a complex, fileless approach to deliver the Remcos Remote Access Trojan (RAT),...
Researchers uncovered an Android malware, dubbed Vo1d, that has already infected nearly 1.3 million Android devices in 197 countries. Doctor Web...
Researchers uncovered an Android malware, dubbed Vo1d, that has already infected nearly 1.3 million Android devices in 197 countries. Doctor Web...
Researchers from JFrog have discovered a new supply chain attack technique for attacking PyPI repositories, potentially impacting over 22,000 software...