List Left

neoSolutions > List Left
New information-stealing malware operations to watch

[ad_1] The information-stealing malware market is constantly evolving, with multiple malware operations competing for cybercriminal clients by promoting better evasion…

Philadelphia Inquirer operations halted after cyberattack

[ad_1] The Philadelphia Inquirer is working to restore systems impacted by what was described as a cyberattack that hit its…

MerDoor Stealth Malware Discovered After Five Years of Attacks

[ad_1] A new APT hacking group dubbed Lancefly is using custom backdoor malware "Merdoor" to target government, aviation and telecom…

Open-source Cobalt Strike ‘Geacon’ port used in macOS attacks

[ad_1] Geacon, a Go-based implementation of the tag from the widely abused Cobalt Strike penetration testing suite, is increasingly being…