You might be interested in …

[SecurityWeek] Three Approaches to an XDR Architecture

All posts, Security Week

Extended Detection and Response (XDR) can be confusing based on so many different definitions and approaches read more Source: Read More (SecurityWeek RSS Feed)

Read More

[TheRecord] Suspected Chinese state-linked threat actors infiltrated major Afghan telecom provider

Four distinct infiltrations by suspected Chinese-state sponsored threat actors stole gigabytes of data from the corporate mail server of major Afghan telecom provider Roshan within the past year, with data exfiltration by some spiking during the Taliban’s recapture of the country, according to new research from Recorded Future’s Insikt Group. The attacks highlight China’s intelligence […]

Read More

[HackerNews] Crypto Hackers Using Babadeda Crypter to Make Their Malware Undetectable

All posts, HackerNews

A new malware campaign has been discovered targeting cryptocurrency, non-fungible token (NFT), and DeFi aficionados through Discord channels to deploy a crypter named “Babadeda” that’s capable of bypassing antivirus solutions and stage a variety of attacks. “[T]his malware installer has been used in a variety of recent campaigns to deliver information stealers, RATs, and even LockBit ransomware, […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.