An In Depth Look At APT DeathStalker

0
By Ivan Kwiatkowski, Pierre Delcher, Maher Yamout on August 24, 2020. 10:00 am State-sponsored threat actors and sophisticated attacks are often in the spotlight. Indeed, their innovative techniques, advanced...

IcedID Malware Updates new techniques To Avoid Detection

0
by┬áPaul Kimayong In our previous blog about IcedID, we  explored some of the changes in the malware and how it tries to evade detection. We also...

The Evil Corp Groups New Ransomware WastedLocker

New Ransomware Developed By Evil Corp Attempts To Bypass Crowdstrike and is encrypted by a private crypter. Stefano Antenucci June 23,...

A New RAT That is Controlled Via HTTP Status Commands

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control...

New Info Stealer Poulight From The Russian Underground

Poulight Stealer, a new Comprehensive Data Stealer from Russia Introduction Nowadays, info-stealers are one of the most common threats. This...