Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign
A strain of the 13-year old backdoor Bandook trojan has been spotted in an espionage campaign. Continue reading Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign
Collaborate Disseminate
A strain of the 13-year old backdoor Bandook trojan has been spotted in an espionage campaign. Continue reading Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign
Hackers have exploited a bug in how Telegram’s Windows messaging client displays file names that contain a right-to-left override (RLO) character, to infect users with malware. The RLO character, represented by “U+202E” in Unicode, in… Continue reading Hackers Exploit Right-to-Left Override Bug in Telegram to Distribute Malware
A forgotten feature in Microsoft Office allows attackers to bypass antivirus scanners and pull off document-based attacks to install malware. Continue reading Legacy Office Feature Used In Novel Document Attacks
For a long time, exploit kits were the most prolific malware distribution vehicle available to attackers. Where did they go and what’s replaced them? Continue reading Where Have All The Exploit Kits Gone?