Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called GobRAT. “Initially,...
Day: 5 June 2023
A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a file...
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed...
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016....
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to...