#endpoint-evasion

[ follow ]
Information security
fromThe Hacker News
18 hours ago

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

State-sponsored and criminal actors from China, Iran, North Korea, and Russia target the defense industrial base, prioritizing drones, hiring exploitation, edge-device access, and supply-chain risk.
Information security
fromTheregister
3 months ago

Russian spies pack custom malware into hidden VMs on Windows

Curly COMrades uses Hyper-V to run a hidden Alpine Linux VM that evades endpoint security, enabling persistent network access and custom malware deployment.
[ Load more ]