In this campaign, Nezha is deployed as a post-exploitation remote access tool rather than malware. Because the software is ...
The post-exploitation tools market has chalked up a newcomer with the emergence of Exfiltrator-22. An upstart alternative to Cobalt Strike, the Exfiltrator-22 framework-as-a-service (FaaS) tool set, ...
Cybercriminals have weaponized the framework of a relatively new, free, open-source security penetration tool, AdaptixC2, to deliver malicious payloads. Its rapid adoption by bad actors follows an ...
The creators of Gootloader, a malicious program commonly used to deploy ransomware and other malware threats on enterprise networks, have developed a new second-stage implant. Dubbed GootBot, the new ...
Fog ransomware was seen using Syteca, a legitimate employee monitoring tool, to log keys and grab passwords It also used open-source tools for payload dropping and file exfiltration The attack was ...
In a landscape of AI-proof malware and modular C2 kits, Jitter-Trap brings statistical rigor to catching post-compromise threats before damage spreads. Organizations may soon be able to detect in real ...
Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become increasingly popular as attackers become ...
Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results