Following on from Vitaly’s post about the new Gpcode variant, I just thought I’d remind everyone to back up their data.
That way, if you do fall victim to Gpcode and your files get encrypted, at least you won’t have lost any valuable information.
minute read
Following on from Vitaly’s post about the new Gpcode variant, I just thought I’d remind everyone to back up their data.
That way, if you do fall victim to Gpcode and your files get encrypted, at least you won’t have lost any valuable information.
Kaspersky analyzes SideWinder APT’s recent activity: new targets in the MiddleEast and Africa, post-exploitation tools and techniques.
Kaspersky shares insights into the activity and TTPs of the BlindEagle APT, which targets organizations and individuals in Colombia, Ecuador, Chile, Panama and other Latin American countries.
Kaspersky has identified a new EastWind campaign targeting Russian organizations and using CloudSorcerer as well as APT31 and APT27 tools.
The report features the most significant developments relating to APT groups in Q2 2024, including the new backdoor in Linux utility XZ, a new RAT called SalmonQT, and hacktivist activity.
A cautionary reminder