The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market.
An undocumented dropper uses a new technique of reading commands from Internet Information Services (IIS) logs to carry out intelligence gathering and deliver backdoors, according to Symantec.
The threat actor uses commands from legitimate IIS logs to communicate with custom tools in a savvy bid to hide traces of its activity on victim machines.
Chinese hackers have been using VLC Media Player to spread malware to their victims. Chinese hackers have been caught using VLC Media Player to spread malware to its victims, which includes various groups linked to the government, legal, and religious affairs.