By Vanja Svajcer.
News summary
As protection techniques develop, attackers are finding it harder to successfully attack their targets and must find creative ways to succeed. Cisco Talos recently discovered a campaign utilizing a variant of the Masslogger trojan designed to retrieve and exfiltrate user credentials from multiple sources such as Microsoft Outlook, Google Chrome and instant messengers. Apart from the initial email attachment, all the stages of the attacks are fileless and they only…
News summary
As protection techniques develop, attackers are finding it harder to successfully attack their targets and must find creative ways to succeed. Cisco Talos recently discovered a campaign utilizing a variant of the Masslogger trojan designed to retrieve and exfiltrate user credentials from multiple sources such as Microsoft Outlook, Google Chrome and instant messengers. Apart from the initial email attachment, all the stages of the attacks are fileless and they only…
[[ This is only the beginning! Please visit the blog for the complete entry ]]
More Stories
Cobalt Strike 4.3 – Command and CONTROL
Vulnerability Spotlight: Remote code execution vulnerability in WebKit WebAudio API
Vulnerability Spotlight: Memory corruption vulnerability in Accusoft ImageGear