Tagged: Process Hollowing

Phishing Attacks cybercriminals

Evasive Phishing Campaign Delivers AsyncRAT and Infostealer

Cybersecurity researchers at eSentire’s Threat Response Unit (TRU) have uncovered a sophisticated phishing campaign distributing the AsyncRAT remote access trojan (RAT) coupled with the Infostealer plugin. The attack employs deceptive...

GULoader malware

SVG Attacks: How GULoader Malware Sneaks into Your Network

The cybersecurity world is a battlefield of constant change – understanding your enemy’s weapons and strategies is key to survival. Enter GULoader, a malware favored by cybercriminals for its stealth,...