#unit-42

[ follow ]
#cybersecurity
Theregister
5 days ago
Information security

Move over, Cobalt Strike, there's a new post-exploit tool

New post-exploitation tool Splinter enables attackers to execute malicious commands and remains undetected by self-deleting after use. [ more ]
Theregister
2 weeks ago
Information security

Phishers abuse HTTP refresh headers for deeper deception

Phishers increasingly exploit HTTP header refresh entries for credential harvesting in large-scale campaigns. Beware of legitimate domains used in phishing. [ more ]
Theregister
5 days ago
Information security

Move over, Cobalt Strike, there's a new post-exploit tool

New post-exploitation tool Splinter enables attackers to execute malicious commands and remains undetected by self-deleting after use. [ more ]
Theregister
2 weeks ago
Information security

Phishers abuse HTTP refresh headers for deeper deception

Phishers increasingly exploit HTTP header refresh entries for credential harvesting in large-scale campaigns. Beware of legitimate domains used in phishing. [ more ]
morecybersecurity
[ Load more ]