Security researchers from antivirus vendor Symantec have uncovered a piece of malware that uses Google Docs, which is now part of Google Drive, as a bridge when communicating with attackers in order ...
"Prince of Persia" has rewritten the rules of persistence with advanced operational security and cryptographic communication ...
A new report out today from Swiss artificial intelligence-powered managed extended detection and response company Ontinue AG ...
Once considered dormant, the threat group has been quite active in evolving its techniques and tools, with updated malware ...
Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months more than 2.5 million connections from unique IP addresses. Since last September, ...
A C2 or C&C attack includes the set of tools and techniques that hackers use to communicate with the compromised devices in order to give the instructions to spread the infection. In a Command and ...
The attack chain centres on a flaw dubbed React2Shell, tracked as CVE-2025-55182, which affects certain configurations of React Server Components. By abusing how server-side rendering processes ...
An international law enforcement operation code-named 'Synergia' has taken down over 1,300 command and control servers used in ransomware, phishing, and malware campaigns. Command and control servers ...