Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain control over…
Tag:
APT
-
-
-
-
-
OS SecuritySecurity
ToddyCat APT evolves to target Outlook archives and Microsoft 365 tokens
by adminby adminWhile ToddyCat has been active since at least 2020, typically sticking to stealing browser…
-
Data BreachSecurity
Iranian APT hacks helped direct missile strikes in Israel and the Red Sea
by adminby adminCyber-related activities of two Iran-linked threat actors played key roles in subsequent high-profile missile…
-
-
ESET Research Threat Reports An overview of the activities of selected APT groups investigated…
-
Data BreachSecurity
Russian APT abuses Windows Hyper-V for persistence and malware execution
by adminby adminThe attackers then used the Import-VM and Start-VM PowerShell cmdlets to import the virtual…
-
Newer Posts
