by Beck Bailey | Sep 19, 2023 | RSS
In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure.
by Beck Bailey | Sep 19, 2023 | RSS
Telecommunication service providers in the Middle East are the target of a new intrusion set dubbed ShroudedSnooper that employs a stealthy backdoor called HTTPSnoop. “HTTPSnoop is a simple, yet effective, backdoor that consists of novel techniques to interface...
by Beck Bailey | Sep 19, 2023 | RSS
Targets located in Azerbaijan have been singled out as part of a new campaign that’s designed to deploy Rust-based malware on compromised systems. Cybersecurity firm Deep Instinct is tracking the operation under the name Operation Rusty Flag. It has not been...
by Beck Bailey | Sep 19, 2023 | RSS
XWorm is a relatively new representative of the remote access trojan cohort that has already earned its spot among the most persistent threats across the globe. Since 2022, when it was first observed by researchers, it has undergone a number of major updates that...
by Beck Bailey | Sep 19, 2023 | RSS
The China-linked threat actor known as Earth Lusca has been observed targeting government entities using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing the adversary’s attacks...
Recent Comments