Plato Data Intelligence.
Vertical Search & Ai.

Tag: Command and control

CISO Corner: AI Supply Chain; AI Security Platforms; Cyber Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Top News

Kaspersky Identifies Three New Android Malware Threats

PRESS RELEASEWoburn, MA – March 20, 2024 – Today Kaspersky researchers shared their discovery of three new dangerous Android malware variants. The Tambir, Dwphon,...

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

Cloud-y Linux Malware Rains on Apache, Docker, Redis & Confluence

Researchers have spotted a concerted cyber compromise campaign targeting cloud servers running vulnerable instances of Apache Hadoop, Atlassian Confluence, Docker, and Redis. The attackers...

‘Illusive’ Iranian Hacking Group Ensnares Israeli, UAE Aerospace and Defense Firms

An Iranian Revolutionary Guard Corps (IGRC)-linked threat group is staging political messaging and phony technical jobs to fool employees and compromise systems at aerospace...

New Wave of ‘Anatsa’ Banking Trojans Targets Android Users in Europe

A threat actor is using malware droppers disguised as legitimate mobile apps on Google's Play store to distribute a dangerous banking Trojan dubbed "Anatsa"...

MacOS Targeted by New Backdoor Linked to ALPHV Ransomware

Researchers have discovered a new backdoor targeting macOS that appears to have ties to an infamous ransomware family that historically targets Windows systems.Researchers at...

Ukraine Military Targeted With Russian APT PowerShell Attack

A sophisticated Russian advanced persistent threat (APT) has launched a targeted PowerShell attack campaign against the Ukrainian military.The attack is most likely perpetrated by...

VajraSpy: A Patchwork of espionage apps

ESET researchers have identified twelve Android espionage apps that share the same malicious code: six were available on Google Play, and six were found...

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET has collaborated with the Federal Police of Brazil in an attempt to disrupt the Grandoreiro botnet. ESET contributed to the project by providing...

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

ESET researchers provide an analysis of an attack carried out by a previously undisclosed China-aligned threat actor we have named Blackwood, and that we...

The Part of the Brain That Controls Movement Also Guides Feelings | Quanta Magazine

IntroductionIn recent decades, neuroscience has seen some stunning advances, and yet a critical part of the brain remains a mystery. I am referring to...

New macOS Backdoor Linked to North Korea Emerges

Penka Hristovska Published on: January 10, 2024 Experts have discovered a new malware variant that targets Apple’s macOS devices. Greg...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?