Generative Data Intelligence

Tag: Command and control

Various Botnets Pummel Year-Old TP-Link Flaw in IoT Attacks

A number of botnets are pummeling a nearly year-old command-injection vulnerability in TP-Link routers to compromise the devices for IoT-driven distributed denial of service...

Top News

Malware hiding in pictures? More likely than you think

Malware, Digital Security There is more to some images than meets the eye...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

‘Illusive’ Iranian Hacking Group Ensnares Israeli, UAE Aerospace and Defense Firms

An Iranian Revolutionary Guard Corps (IGRC)-linked threat group is staging political messaging and phony technical jobs to fool employees and compromise systems at aerospace...

New Wave of ‘Anatsa’ Banking Trojans Targets Android Users in Europe

A threat actor is using malware droppers disguised as legitimate mobile apps on Google's Play store to distribute a dangerous banking Trojan dubbed "Anatsa"...

MacOS Targeted by New Backdoor Linked to ALPHV Ransomware

Researchers have discovered a new backdoor targeting macOS that appears to have ties to an infamous ransomware family that historically targets Windows systems.Researchers at...

Ukraine Military Targeted With Russian APT PowerShell Attack

A sophisticated Russian advanced persistent threat (APT) has launched a targeted PowerShell attack campaign against the Ukrainian military.The attack is most likely perpetrated by...

VajraSpy: A Patchwork of espionage apps

ESET researchers have identified twelve Android espionage apps that share the same malicious code: six were available on Google Play, and six were found...

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET has collaborated with the Federal Police of Brazil in an attempt to disrupt the Grandoreiro botnet. ESET contributed to the project by providing...

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

ESET has collaborated with the Federal Police of Brazil in an attempt to disrupt the Grandoreiro botnet. ESET contributed to the project by providing...

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

ESET researchers provide an analysis of an attack carried out by a previously undisclosed China-aligned threat actor we have named Blackwood, and that we...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?