Kimsuky, the North Korean threat actor active since 2012, is still targeting the South Korean government. We take a look at the phishing infrastructure and command and control mechanisms of this APT.
Signal told investigators it could not comply with a legal request for user records and communications because the records do not exist.
Possibly the largest hacking operation of 2020 was just unveiled. In this blog we share what we know and what you should do right now.
We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.
Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.
New Mac malware is using the EmPyre backdoor and the XMRig cryptominer to drain processor power—and possibly worse.
QuantLoader is a Trojan downloader that has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. In this post, we’ll take a high-level look at the campaign flow, as well as a deep dive into how the malware executes.