Oct 22, 2025Ravie LakshmananCyber Espionage / Network Security Government, financial, and industrial organizations located…
malware
-
-
A newly identified loader dubbed “Caminho” (Portuguese for “path”) has emerged as a sophisticated…
-
Introduction Back in 2024, we gave a brief description of a complex cyberespionage campaign…
-
Oct 21, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A new malware attributed to the…
-
Oct 21, 2025Ravie LakshmananCyber Espionage / Network Security A European telecommunications organization is said…
-
eSecurity Planet content and product recommendations are editorially independent. We may make money when…
-
“JADESNOW utilizes EtherHiding to fetch, decrypt, and execute malicious payloads from smart contracts on…
-
The North Korean threat actor linked to the Contagious Interview campaign has been observed…
-
Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered…
-
Data BreachSecurity
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts…
