We talk about all the newest stories and details about backdoor holes in software and systems in this section. Reports on new backdoor risks, security holes, attacker techniques, and ways to find and stop them are all included. To improve cybersecurity and keep sensitive data safe, learn about the risks and possible answers for backdoors.
UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often…
APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform, as researchers discovered malicious domains mimicking…
Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can't be…
Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack leverages Supershell, a cross-platform reverse shell…
UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails…
Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…
Researchers analyze the security of MIFARE Classic cards, focusing exclusively on card-only attacks. They uncover multiple new attack vectors by…
Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats…
Gigabyte systems have been identified by the Eclypsium platform for exhibiting suspicious backdoor-like behavior. This discovery marks a recent development…
As opposed to web shells, malicious extensions for the IIS web server have a lower detection rate, which means attackers…