Cybersecurity researchers at eSentire’s Threat Response Unit (TRU) have uncovered a sophisticated phishing campaign distributing the AsyncRAT remote access trojan (RAT) coupled with the Infostealer plugin. The attack employs deceptive...
The cybersecurity world is a battlefield of constant change – understanding your enemy’s weapons and strategies is key to survival. Enter GULoader, a malware favored by cybercriminals for its stealth,...
The burgeoning popularity of Brazil’s instant payment system, PIX, has caught the attention of cybercriminals, who have begun deploying malicious software called ‘GoPIX’ to illicitly garner profits. Kaspersky Lab, monitoring...
Process Overwriting Process Overwriting is a PE injection technique, closely related to Process Hollowing and Module Overloading Process Hollowing (aka RunPE) is an old and popular PE injection technique. It comes in...