#securelistcom — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #securelistcom, aggregated by home.social.
-
Modern vehicle cybersecurity trends – Source: securelist.com https://ciso2ciso.com/modern-vehicle-cybersecurity-trends-source-securelist-com/ #rssfeedpostgeneratorecho #Secureenvironment(IoT) #AutomotiveSecurity #CyberSecurityNews #Industrialthreats #internetofthings #Cybersecurity #securelistcom #Connectedcar #Publications
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 – Source: securelist.com https://ciso2ciso.com/evolution-of-the-pipemagic-backdoor-from-the-ransomexx-incident-to-cve-2025-29824-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #vulnerabilities #Windowsmalware #GReATresearch #securelistcom #ransomware #PipeMagic #backdoor #Malware #Trojan
-
Cobalt Strike Beacon delivered via GitHub and social media – Source: securelist.com https://ciso2ciso.com/cobalt-strike-beacon-delivered-via-github-and-social-media-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #cyberespionage #DLLsideloading #Socialnetworks #Windowsmalware #securelistcom #CobaltStrike #DLLhijacking #shellcode #research #Malware #GitHub #Trojan
-
Cobalt Strike Beacon delivered via GitHub and social media – Source: securelist.com https://ciso2ciso.com/cobalt-strike-beacon-delivered-via-github-and-social-media-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #cyberespionage #DLLsideloading #Socialnetworks #Windowsmalware #securelistcom #CobaltStrike #DLLhijacking #shellcode #research #Malware #GitHub #Trojan
-
Cobalt Strike Beacon delivered via GitHub and social media – Source: securelist.com https://ciso2ciso.com/cobalt-strike-beacon-delivered-via-github-and-social-media-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #cyberespionage #DLLsideloading #Socialnetworks #Windowsmalware #securelistcom #CobaltStrike #DLLhijacking #shellcode #research #Malware #GitHub #Trojan
-
Cobalt Strike Beacon delivered via GitHub and social media – Source: securelist.com https://ciso2ciso.com/cobalt-strike-beacon-delivered-via-github-and-social-media-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #cyberespionage #DLLsideloading #Socialnetworks #Windowsmalware #securelistcom #CobaltStrike #DLLhijacking #shellcode #research #Malware #GitHub #Trojan
-
ToolShell: a story of five vulnerabilities in Microsoft SharePoint – Source: securelist.com https://ciso2ciso.com/toolshell-a-story-of-five-vulnerabilities-in-microsoft-sharepoint-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #zerodayvulnerabilities #microsoftsharepoint #CyberSecurityNews #vulnerabilities #GReATresearch #securelistcom #ToolShell
-
ToolShell: a story of five vulnerabilities in Microsoft SharePoint – Source: securelist.com https://ciso2ciso.com/toolshell-a-story-of-five-vulnerabilities-in-microsoft-sharepoint-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #zerodayvulnerabilities #microsoftsharepoint #CyberSecurityNews #vulnerabilities #GReATresearch #securelistcom #ToolShell
-
Batavia spyware steals data from Russian organizations – Source: securelist.com https://ciso2ciso.com/batavia-spyware-steals-data-from-russian-organizations-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Targetedattacks #Windowsmalware #securelistcom #spearphishing #PowerShell #datatheft #Malware #Spyware #VBS
-
Batavia spyware steals data from Russian organizations – Source: securelist.com https://ciso2ciso.com/batavia-spyware-steals-data-from-russian-organizations-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Targetedattacks #Windowsmalware #securelistcom #spearphishing #PowerShell #datatheft #Malware #Spyware #VBS
-
Batavia spyware steals data from Russian organizations – Source: securelist.com https://ciso2ciso.com/batavia-spyware-steals-data-from-russian-organizations-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Targetedattacks #Windowsmalware #securelistcom #spearphishing #PowerShell #datatheft #Malware #Spyware #VBS
-
Batavia spyware steals data from Russian organizations – Source: securelist.com https://ciso2ciso.com/batavia-spyware-steals-data-from-russian-organizations-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Targetedattacks #Windowsmalware #securelistcom #spearphishing #PowerShell #datatheft #Malware #Spyware #VBS
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
Toxic trend: Another malware threat targets DeepSeek – Source: securelist.com https://ciso2ciso.com/toxic-trend-another-malware-threat-targets-deepseek-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #MicrosoftWindows #Phishingwebsites #Defenseevasion #Windowsmalware #GReATresearch #securelistcom #GoogleChrome #Encryption #JavaScript #PowerShell #Webthreats #DeepSeek #browser #CAPTCHA #Malware #LLM #AI
-
IT threat evolution in Q1 2025. Non-mobile statistics – Source: securelist.com https://ciso2ciso.com/it-threat-evolution-in-q1-2025-non-mobile-statistics-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #internetofthings #MicrosoftWindows #Malwarereports #Windowsmalware #securelistcom #Trojanstealer #AppleMacOS #ransomware #TrojanSpy #Honeypot #Malware #adware #Trojan #Miner #ssh
-
IT threat evolution in Q1 2025. Non-mobile statistics – Source: securelist.com https://ciso2ciso.com/it-threat-evolution-in-q1-2025-non-mobile-statistics-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #internetofthings #MicrosoftWindows #Malwarereports #Windowsmalware #securelistcom #Trojanstealer #AppleMacOS #ransomware #TrojanSpy #Honeypot #Malware #adware #Trojan #Miner #ssh
-
IT threat evolution in Q1 2025. Non-mobile statistics – Source: securelist.com https://ciso2ciso.com/it-threat-evolution-in-q1-2025-non-mobile-statistics-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #internetofthings #MicrosoftWindows #Malwarereports #Windowsmalware #securelistcom #Trojanstealer #AppleMacOS #ransomware #TrojanSpy #Honeypot #Malware #adware #Trojan #Miner #ssh
-
IT threat evolution in Q1 2025. Non-mobile statistics – Source: securelist.com https://ciso2ciso.com/it-threat-evolution-in-q1-2025-non-mobile-statistics-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #internetofthings #MicrosoftWindows #Malwarereports #Windowsmalware #securelistcom #Trojanstealer #AppleMacOS #ransomware #TrojanSpy #Honeypot #Malware #adware #Trojan #Miner #ssh
-
Exploits and vulnerabilities in Q1 2025 – Source: securelist.com https://ciso2ciso.com/exploits-and-vulnerabilities-in-q1-2025-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #VulnerabilityStatistics #Vulnerabilityreports #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #MicrosoftWindows #bufferoverflows #MicrosoftOffice #Windowsmalware #securelistcom #Microsoft #browser #WinRAR #LINUX #APT #CVE
-
Exploits and vulnerabilities in Q1 2025 – Source: securelist.com https://ciso2ciso.com/exploits-and-vulnerabilities-in-q1-2025-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #VulnerabilityStatistics #Vulnerabilityreports #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #MicrosoftWindows #bufferoverflows #MicrosoftOffice #Windowsmalware #securelistcom #Microsoft #browser #WinRAR #LINUX #APT #CVE
-
Exploits and vulnerabilities in Q1 2025 – Source: securelist.com https://ciso2ciso.com/exploits-and-vulnerabilities-in-q1-2025-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #VulnerabilityStatistics #Vulnerabilityreports #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #MicrosoftWindows #bufferoverflows #MicrosoftOffice #Windowsmalware #securelistcom #Microsoft #browser #WinRAR #LINUX #APT #CVE
-
Exploits and vulnerabilities in Q1 2025 – Source: securelist.com https://ciso2ciso.com/exploits-and-vulnerabilities-in-q1-2025-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #VulnerabilityStatistics #Vulnerabilityreports #UnixandmacOSmalware #CyberSecurityNews #MalwareStatistics #MicrosoftWindows #bufferoverflows #MicrosoftOffice #Windowsmalware #securelistcom #Microsoft #browser #WinRAR #LINUX #APT #CVE
-
Threat landscape for industrial automation systems in Q1 2025 – Source: securelist.com https://ciso2ciso.com/threat-landscape-for-industrial-automation-systems-in-q1-2025-source-securelist-com/ #industrialcontrolsystems #rssfeedpostgeneratorecho #CyberSecurityNews #Industrialthreats #MalwareStatistics #securelistcom #Phishing #'Virus' #Malware #Spyware #Miner #worm
-
Threat landscape for industrial automation systems in Q1 2025 – Source: securelist.com https://ciso2ciso.com/threat-landscape-for-industrial-automation-systems-in-q1-2025-source-securelist-com/ #industrialcontrolsystems #rssfeedpostgeneratorecho #CyberSecurityNews #Industrialthreats #MalwareStatistics #securelistcom #Phishing #'Virus' #Malware #Spyware #Miner #worm
-
Threat landscape for industrial automation systems in Q1 2025 – Source: securelist.com https://ciso2ciso.com/threat-landscape-for-industrial-automation-systems-in-q1-2025-source-securelist-com/ #industrialcontrolsystems #rssfeedpostgeneratorecho #CyberSecurityNews #Industrialthreats #MalwareStatistics #securelistcom #Phishing #'Virus' #Malware #Spyware #Miner #worm
-
Threat landscape for industrial automation systems in Q1 2025 – Source: securelist.com https://ciso2ciso.com/threat-landscape-for-industrial-automation-systems-in-q1-2025-source-securelist-com/ #industrialcontrolsystems #rssfeedpostgeneratorecho #CyberSecurityNews #Industrialthreats #MalwareStatistics #securelistcom #Phishing #'Virus' #Malware #Spyware #Miner #worm
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
How ToddyCat tried to hide behind AV software – Source: securelist.com https://ciso2ciso.com/how-toddycat-tried-to-hide-behind-av-software-source-securelist-com/ #Vulnerabilitiesandexploits #AntivirusVulnerabilities #rssfeedpostgeneratorecho #zerodayvulnerabilities #APT(Targetedattacks) #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Defenseevasion #Windowsmalware #securelistcom #Encryption #Incidents #ToddyCat #Drivers #Malware #Trojan #BYOVD #APT #CVE #DLL
-
How ToddyCat tried to hide behind AV software – Source: securelist.com https://ciso2ciso.com/how-toddycat-tried-to-hide-behind-av-software-source-securelist-com/ #Vulnerabilitiesandexploits #AntivirusVulnerabilities #rssfeedpostgeneratorecho #zerodayvulnerabilities #APT(Targetedattacks) #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Defenseevasion #Windowsmalware #securelistcom #Encryption #Incidents #ToddyCat #Drivers #Malware #Trojan #BYOVD #APT #CVE #DLL
-
How ToddyCat tried to hide behind AV software – Source: securelist.com https://ciso2ciso.com/how-toddycat-tried-to-hide-behind-av-software-source-securelist-com/ #Vulnerabilitiesandexploits #AntivirusVulnerabilities #rssfeedpostgeneratorecho #zerodayvulnerabilities #APT(Targetedattacks) #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Defenseevasion #Windowsmalware #securelistcom #Encryption #Incidents #ToddyCat #Drivers #Malware #Trojan #BYOVD #APT #CVE #DLL
-
How ToddyCat tried to hide behind AV software – Source: securelist.com https://ciso2ciso.com/how-toddycat-tried-to-hide-behind-av-software-source-securelist-com/ #Vulnerabilitiesandexploits #AntivirusVulnerabilities #rssfeedpostgeneratorecho #zerodayvulnerabilities #APT(Targetedattacks) #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Defenseevasion #Windowsmalware #securelistcom #Encryption #Incidents #ToddyCat #Drivers #Malware #Trojan #BYOVD #APT #CVE #DLL
-
Threat landscape for industrial automation systems in Q4 2024 – Source: securelist.com https://ciso2ciso.com/threat-landscape-for-industrial-automation-systems-in-q4-2024-source-securelist-com/ #industrialcontrolsystems #rssfeedpostgeneratorecho #CyberSecurityNews #Industrialthreats #securelistcom #ransomware #backdoor #Phishing #'Virus' #Spyware #Trojan #Miner #worm
-
Head Mare and Twelve join forces to attack Russian entities – Source: securelist.com https://ciso2ciso.com/head-mare-and-twelve-join-forces-to-attack-russian-entities-source-securelist-com/ #rssfeedpostgeneratorecho #APT(Targetedattacks) #CyberSecurityNews #Crimewarereports #Targetedattacks #securelistcom #Hacktivists #ransomware #backdoor #HeadMare #Lockbit #Trojan #Twelve #Babuk #TTPs
-
SideWinder targets the maritime and nuclear sectors with an updated toolset – Source: securelist.com https://ciso2ciso.com/sidewinder-targets-the-maritime-and-nuclear-sectors-with-an-updated-toolset-source-securelist-com/ #rssfeedpostgeneratorecho #APT(Targetedattacks) #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #Defenseevasion #Windowsmalware #securelistcom #spearphishing #APTreports #JavaScript #SideWinder #shellcode #Malware #.NET #APT #HTA
-
SideWinder targets the maritime and nuclear sectors with an updated toolset – Source: securelist.com https://ciso2ciso.com/sidewinder-targets-the-maritime-and-nuclear-sectors-with-an-updated-toolset-source-securelist-com/ #rssfeedpostgeneratorecho #APT(Targetedattacks) #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Targetedattacks #Defenseevasion #Windowsmalware #securelistcom #spearphishing #APTreports #JavaScript #SideWinder #shellcode #Malware #.NET #APT #HTA
-
StaryDobry ruins New Year’s Eve, delivering miner instead of presents – Source: securelist.com https://ciso2ciso.com/starydobry-ruins-new-years-eve-delivering-miner-instead-of-presents-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Financialthreats #Windowsmalware #Gamingmalware #securelistcom #spoofing #Malware #Torrent #Trojan #Miner #XMrig #DLL
-
StaryDobry ruins New Year’s Eve, delivering miner instead of presents – Source: securelist.com https://ciso2ciso.com/starydobry-ruins-new-years-eve-delivering-miner-instead-of-presents-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Financialthreats #Windowsmalware #Gamingmalware #securelistcom #spoofing #Malware #Torrent #Trojan #Miner #XMrig #DLL
-
StaryDobry ruins New Year’s Eve, delivering miner instead of presents – Source: securelist.com https://ciso2ciso.com/starydobry-ruins-new-years-eve-delivering-miner-instead-of-presents-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Financialthreats #Windowsmalware #Gamingmalware #securelistcom #spoofing #Malware #Torrent #Trojan #Miner #XMrig #DLL
-
StaryDobry ruins New Year’s Eve, delivering miner instead of presents – Source: securelist.com https://ciso2ciso.com/starydobry-ruins-new-years-eve-delivering-miner-instead-of-presents-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Financialthreats #Windowsmalware #Gamingmalware #securelistcom #spoofing #Malware #Torrent #Trojan #Miner #XMrig #DLL
-
Cloud Atlas seen using a new tool in its attacks – Source: securelist.com https://ciso2ciso.com/cloud-atlas-seen-using-a-new-tool-in-its-attacks-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Windowsmalware #Cloudservices #securelistcom #CloudAtlas #PowerShell #datatheft #backdoor #Phishing #Telegram #Malware #DLL #HTA #VBS
-
Cloud Atlas seen using a new tool in its attacks – Source: securelist.com https://ciso2ciso.com/cloud-atlas-seen-using-a-new-tool-in-its-attacks-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Windowsmalware #Cloudservices #securelistcom #CloudAtlas #PowerShell #datatheft #backdoor #Phishing #Telegram #Malware #DLL #HTA #VBS
-
Cloud Atlas seen using a new tool in its attacks – Source: securelist.com https://ciso2ciso.com/cloud-atlas-seen-using-a-new-tool-in-its-attacks-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Windowsmalware #Cloudservices #securelistcom #CloudAtlas #PowerShell #datatheft #backdoor #Phishing #Telegram #Malware #DLL #HTA #VBS