GoldenSpy: Chapter Two – The Uninstaller
In April of 2020, Trustwave SpiderLabs’ Threat Fusion Team performed a ‘Proactive Threat Hunt’ for a global technology vendor with significant business in the US,... Read More
In April of 2020, Trustwave SpiderLabs’ Threat Fusion Team performed a ‘Proactive Threat Hunt’ for a global technology vendor with significant business in the US,... Read More
Malwarebytes Labs recently found credit card skimming code hidden with the metadata of an image file, a process known as ‘steganography.’ This image file would... Read More
Pillowmint malware is a point-of-sale trojan targeting Track 1 and Track 2 credit card data. Over the past few years threat actors named FIN7, also... Read More
Evil Corp, despite being a fictional organization within the award-winning show, Mr. Robot, is known in our world as one of the most dangerous and... Read More
CryptoCore has established itself as a hidden and persistent hacker group that has been targeting cryptocurrency exchanges, mainly in the US and Japan, since 2018,... Read More
Threat actors have been impersonating HR employees from a major U.S. supplier of aerospace and defense products known as Collins Aerospace and General Dynamics in... Read More
In 2014 a new threat actor entered the playing field, where Estonian intelligence believes the group to have Russian origins and operates on the behalf... Read More
The Treck IP network stack software is designed for and used in a variety of embedded systems. First created in the 1990’s, the software can... Read More
On June 10th, FortiGuard Labs discovered a malicious spam campaign that is taking advantage of the current “Black Lives Matter” protests in order to target... Read More
Researchers at Check Point Research have analyzed CloudEyE, an evolved version of DarkEyE. Which allows threat actors to use different types of malware of their... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..