In this campaign, Nezha is deployed as a post-exploitation remote access tool rather than malware. Because the software is ...
The post-exploitation tools market has chalked up a newcomer with the emergence of Exfiltrator-22. An upstart alternative to Cobalt Strike, the Exfiltrator-22 framework-as-a-service (FaaS) tool set, ...
The creators of Gootloader, a malicious program commonly used to deploy ransomware and other malware threats on enterprise networks, have developed a new second-stage implant. Dubbed GootBot, the new ...
Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become increasingly popular as attackers become ...
Fog ransomware was seen using Syteca, a legitimate employee monitoring tool, to log keys and grab passwords It also used open-source tools for payload dropping and file exfiltration The attack was ...
Cybercriminals have weaponized the framework of a relatively new, free, open-source security penetration tool, AdaptixC2, to deliver malicious payloads. Its rapid adoption by bad actors follows an ...
Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm ...
In today's digital world, cybersecurity threats are ever-growing, making ethical hacking and penetration testing crucial components of modern security practices. Ethical hacking involves legally ...
Security researchers have shared evidence of a new APT group that targeted mainly Taiwanese organizations in a cyber-espionage campaign lasting at least four months. Dubbed “Grayling” by Symantec, the ...
Cybercriminals also likely to leverage tools present within the targeted environment rather than to construct new malware or configure post-exploitation tools, according to Mandiant’s incident ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results