PhishingSecurity Network tunneling with… QEMU? | Securelist by March 5, 2024 by March 5, 2024 Cyberattackers tend to give preference to legitimate tools when taking various attack steps, as… 0 FacebookTwitterPinterestEmail
PhishingSecurity HrServ web shell analysis | Securelist by November 22, 2023 by November 22, 2023 Introduction In the course of our routine investigation, we discovered a DLL file, identified… 0 FacebookTwitterPinterestEmail
PhishingSecurity LLM-based chatbots and privacy | Securelist by October 13, 2023 by October 13, 2023 Workhorse Only a few months ago, ChatGPT and other chatbots based on large language… 0 FacebookTwitterPinterestEmail
PhishingSecurity IoT threats in 2023 | Securelist by September 21, 2023 by September 21, 2023 IoT devices (routers, cameras, NAS boxes, and smart home components) multiply every year. Statista… 0 FacebookTwitterPinterestEmail
PhishingSecurity Focus on DroxiDat/SystemBC | Securelist by August 10, 2023 by August 10, 2023 Recently we pushed a report to our customers about an interesting and common component… 0 FacebookTwitterPinterestEmail
PhishingSecurity Financial cyberthreats in 2022 | Securelist by March 29, 2023 by March 29, 2023 Financial gain remains the key driver of cybercriminal activity. In the past year, we’ve… 0 FacebookTwitterPinterestEmail