
2024
RESEARCH: DPRK 'IT' Workers
These workers often operate globally, leveraging their positions to further the objectives of the North Korean government and its cyber warfare units..
2024
These workers often operate globally, leveraging their positions to further the objectives of the North Korean government and its cyber warfare units..
kematian-stealer
This malware is designed to covertly exfiltrate sensitive data from infected systems.. Great- github is hosting more malware. awesome.
orb-networks
Orb networks, also known as Operational Relay Box (ORB) networks, are sophisticated proxy networks used by APT groups, particularly Chinese cyber-espionage actors, to obfuscate their activities and evade detection.
rootkit
Rootkits are a particularly insidious type of malware designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.
threat-actors
Storm-1811 is a sophisticated and financially motivated cybercriminal group known for its advanced techniques and targeted attacks, including the deployment of Black Basta ransomware..
threat-actors
SocGholish is a sophisticated malware family that has been active since at least April 2018. It is primarily known for its drive-by-download method, masquerading as software updates to trick users into..
research
Command and Control (C2) frameworks are critical tools used by both threat actors and cybersecurity professionals for managing compromised systems, conducting post-exploitation activities, and simulating adversary behavior..