
Following on from Vitaly’s post about the new Gpcode variant, I just thought I’d remind everyone to back up their data.
That way, if you do fall victim to Gpcode and your files get encrypted, at least you won’t have lost any valuable information.
minute read
Following on from Vitaly’s post about the new Gpcode variant, I just thought I’d remind everyone to back up their data.
That way, if you do fall victim to Gpcode and your files get encrypted, at least you won’t have lost any valuable information.
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.
MysterySnail RAT attributed to IronHusky APT group hasn’t been reported since 2021. Recently, Kaspersky GReAT detected new versions of this implant in government organizations in Mongolia and Russia.
Kaspersky researchers analyze GOFFEE’s campaign in H2 2024: the updated infection scheme, new PowerModul implant, switch to a binary Mythic agent.
Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.
Notifications
A cautionary reminder