A deep dive into a sophisticated attack that used the Saitama backdoor.
There are threat actors active that plant backdoors on websites so their malicious code does not get wiped with the next update.
Kimsuky, the North Korean threat actor active since 2012, is still targeting the South Korean government. We take a look at the phishing infrastructure and command and control mechanisms of this APT.
Signal told investigators it could not comply with a legal request for user records and communications because the records do not exist.
Possibly the largest hacking operation of 2020 was just unveiled. In this blog we share what we know and what you should do right now.
We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.
Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.
New Mac malware is using the EmPyre backdoor and the XMRig cryptominer to drain processor power—and possibly worse.