A covert cyber-espionage campaign targets global telecommunications providers where attackers deploy an advanced Linux…
Stealthy
-
-
A China-nexus actor has been able to gain long-term access in a bid to…
-
A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself…
-
The report recommends that businesses practice several forms of vigilance to avoid unwittingly hiring…
-
Hacking
ClipXDaemon Malware, a Stealthy Cryptocurrency Clipboard Hijacker on Linux – The Cyber Express
Security researchers have identified a new Linux malware strain called ClipXDaemon, a stealthy threat designed to target…
-
Jamf Threat Labs has published a technical analysis detailing how the commercial Predator spyware…
-
“The malware exhibits advanced anti-analysis techniques, including anti-VM, anti-debugging, and process injection detection, alongside…
-
eSecurity Planet content and product recommendations are editorially independent. We may make money when…
-
Physical SecuritySecurity
‘Ink Dragon’ threat group targets IIS servers to build stealthy global network
“Across incidents, the same story repeats. A small web facing issue becomes the first…
-
A new tool named Device Activity Tracker exposes a persistent privacy flaw in WhatsApp…
