In 2023, CrowdStrike Counter Adversary Operations observed well-known malware families updating and improving their evasion tactics. Take a closer look and learn more about five threat actors families that have been disrupting the LATAM market and beyond. https://lnkd.in/eSTq29fM
Kevin Knapp的动态
最相关的动态
-
In 2023, CrowdStrike Counter Adversary Operations observed well-known malware families updating and improving their evasion tactics. Take a closer look and learn more about five threat actors families that have been disrupting the LATAM market and beyond. https://lnkd.in/eyps36uj
LATAM Malware Variants - 2023 Technical Updates | CrowdStrike
要查看或添加评论,请登录
-
In 2023, CrowdStrike Counter Adversary Operations observed well-known malware families updating and improving their evasion tactics. Take a closer look and learn more about five threat actors families that have been disrupting the LATAM market and beyond. https://lnkd.in/eVfpj2xD
LATAM Malware Variants - 2023 Technical Updates | CrowdStrike
要查看或添加评论,请登录
-
In 2023, CrowdStrike Counter Adversary Operations observed well-known malware families updating and improving their evasion tactics. Take a closer look and learn more about five threat actors families that have been disrupting the LATAM market and beyond. https://lnkd.in/e9YX-YpQ
LATAM Malware Variants - 2023 Technical Updates | CrowdStrike
要查看或添加评论,请登录
-
Our analysis into two #StrelaStealer campaigns uncovers this #malware’s latest variant and impact. Over 100 organizations across the US and EU were affected in the attacks, especially in the #HighTech sector. Find the details here:-
#CredentialStealing in the form of #malspam is a common sight in the threat landscape. Analysts must be aware of evolved evasion techniques from malware authors. Covering two extensive #StrelaStealer campaigns affecting over 100 organizations from the EU to the US, we analyze a new variant that includes updated obfuscation techniques. https://bit.ly/3VLmhFx
要查看或添加评论,请登录
-
Unit 42 latest IR report highlighted the significant increase in network intrusions due to stolen creds between 2021-2023. Info stealers are a big part of the ecosystem enabling such intrusion, below some relevant research on the topic ??
#CredentialStealing in the form of #malspam is a common sight in the threat landscape. Analysts must be aware of evolved evasion techniques from malware authors. Covering two extensive #StrelaStealer campaigns affecting over 100 organizations from the EU to the US, we analyze a new variant that includes updated obfuscation techniques. https://bit.ly/3VLmhFx
要查看或添加评论,请登录
-
#CredentialStealing in the form of #malspam is a common sight in the threat landscape. Analysts must be aware of evolved evasion techniques from malware authors. Covering two extensive #StrelaStealer campaigns affecting over 100 organizations from the EU to the US, we analyze a new variant that includes updated obfuscation techniques. https://bit.ly/3VLmhFx
要查看或添加评论,请登录
-
Join our #BHASIA Briefing "Chinese APT: A Master of Exploiting Edge Devices" @TeamT5_Official discusses Chinese APT groups exploiting surveillance routers, revealing case studies of edge device abuse, new malware family, & mitigation strategies. Reg now > https://bit.ly/3wgAXBE
要查看或添加评论,请登录
-
N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks. The North Korea-linked threat actor known as?Kimsuky?(aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia, and Europe. According https://ow.ly/MYyB105ncjJ #InceptusSecure #UnderOurProtection
要查看或添加评论,请登录
Sr. Sales Engineer at CrowdStrike
9 个月Great seeing you at SKO!