Since 2023, multiple security investigations have highlighted a growing trend in which China-linked threat actors ...
Researchers have discovered a new attack framework of Chinese origin that they believe is being used in the wild. The framework is made up of a command-and-control (C2) backend dubbed Alchimist and an ...
Cybersecurity researchers have discovered a new attack and C2 framework called 'Alchimist,' which appears to be actively used in attacks targeting Windows, Linux, and macOS systems. The framework and ...
Cisco Talos links UAT-9921 to VoidLink, a modular Zig-based malware targeting Linux cloud systems with stealth plugins and C2 control.
Known as VoidLink, the malware generates implant binaries designed for credential theft, data exfiltration and stealthy persistence on compromised systems. The new analysis, published by Ontinue on ...
Researchers have uncovered a potentially dangerous cyberattack framework targeting Windows, Linux, and Mac systems that they assess is likely already being used in the wild. The framework consists of ...
PhonyC2 was used to exploit the log4j vulnerability in the Israeli software SysAid, the attack against Israel’s Technion institute, and the ongoing attack against the PaperCut print management ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results