In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned out to be a diplomatic entity. What initially attracted our attention was the enterprise-grade API-like (application programming interface) programming style. Such an approach is not that common in the malware world and is mostly used…
An unpatched vulnerability in the web server of device firmware gives attackers root privileges, researchers said.
Trojan Chrome browser extensions spied on users and maintained a foothold on the networks of financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals and government organizations.
Facebook will report its privacy practices to both the committee, the FTC, and to a third-party assessor.
The malware has boosted its anti-detection capabilities in a new email campaign.
High-severity flaws plague Cisco’s Webex collaboration platform, as well as its RV routers for small businesses.