steganography

BARIUM targets gaming supply chains

Enterprise security personnel often assume that legitimate software products are inherently trustworthy. If an attacker takes over a legitimate app or service, they gain a…

Read more

SQL Server abuse

Attacks involving SQL Server can be difficult to respond to because SQL Server comes with vast array of tools for automation, scheduling, and data import…

Read more

APT32 / OceanLotus campaigns 2019

EV-0054, also known as APT32 or OceanLotus, has been running stealthy operations characterized by novel delivery mechanisms, unique first-level installation, persistence, backdoor implants, and command-and-control…

Read more