Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers<\/a> <\/p>\n\n\n\n
I am Goot (Loader)<\/a><\/p>\n\n\n\n
Exposing FakeBat loader: distribution methods and adversary infrastructure<\/a><\/p>\n\n\n\n
MerkSpy: Exploiting CVE-2021-40444 to Infiltrate Systems<\/a> <\/p>\n\n\n\n
Xctdoor Malware Used in Attacks Against Korean Companies (Andariel)<\/a> <\/p>\n\n\n\n
Eldorado Ransomware: The New Golden Empire of Cybercrime?<\/a> <\/p>\n\n\n\n
Meet Brain Cipher \u2014 The new ransomware behind Indonesia’s data center attack<\/a> <\/p>\n\n\n\n
Exploring the Infection Chain: ScreenConnect\u2019s Link to AsyncRAT Deployment<\/a> <\/p>\n\n\n\n
Fake IT support sites push malicious PowerShell scripts as Windows fixes<\/a><\/p>\n\n\n\n
New Threat: A Deep Dive Into the Zergeca Botnet<\/a> Supply Chain Compromise Leads to Trojanized Installers for Notezilla, RecentX, Copywhiz<\/a><\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, newsletter)<\/strong>