Malicious campaigns have been discovered taking advantage of Microsoft Build Engine (MSBuild), the open-source build toolset for native C++ code managed code, and part of .NET...
Recently observed malicious campaigns have abused Microsoft Build Engine (MSBuild) to execute a Cobalt Strike payload on compromised machines. Designed for the creation of applications on...
Researchers have discovered a stealthy malware campaign using valid code signing certificates in Windows systems to stay hidden. The malware loader, named Blister, further deploys second-stage...
Security researchers have uncovered a malicious campaign that relies on a valid code-signing certificate to disguise malicious code as legitimate executables. One of the payloads that...
Right in time for the holidays, the notorious Emotet malware is once again directly installing Cobalt Strike beacons for rapid cyberattacks. For those not familiar with...
A sophisticated cybercrime group who has been quietly working from the shadows has had its tactics and procedures exposed by researchers who tracked recent cyberattacks conducted...
The TrickBot gang (aka ITG23 group) is working together with the TA551 (aka Shatak) threat group, IBM X-Force researchers have recently established in research. According to...
An unofficial Cobalt Strike Beacon Linux version made by unknown threat actors from scratch has been spotted by security researchers while actively used in attacks targeting...
Researchers recently obtained a leaked playbook linked to Conti, the Ransomware-as-a-Service (RaaS) group. It has revealed a plethora of information about the threat actors that also contains...
New Cobalt Strike bugs allow takedown of attackers’ servers However, Cobalt Strike is also used by threat actors (commonly seen used during ransomware attacks) for post-exploitation...
Recent Comments