Loader malware plays a critical role in the middle stages of the cyber attack lifecycle. Explore how attackers use it to import various types of malware in the attacker's environment while evading detection.| Packetlabs RSS Feed
What is an initial access broker? With the emergence of Ransomware as a Service, operators often rely on initial access brokers to obtain an initial foothold on the network. Learn more today.| Packetlabs RSS Feed
The Federal Bureau of Investigation (FBI) is issuing this Public Service Announcement to warn the public about cyber criminals exploiting Internet of Things (IoT)1 devices connected to home networks to conduct criminal activity using the BADBOX 2.0 botnet2. Cyber criminals gain unauthorized access to home networks through compromised IoT devices, such as TV streaming devices, digital projectors, aftermarket vehicle infotainment systems, digital picture frames and other products. Most of the i...| www.ic3.gov
EDRSilencer has recently been observed in use by threat actors. Everything you need to know about EDRSilencer, an EDR bypass tool that leverages Windows Filtering Platform APIs.| Packetlabs RSS Feed
Discover EtherHiding, a new cyberattack tactic leveraging blockchain technology to hide malicious code, evade detection, and outsmart defenders with decentralized smart contracts.| Packetlabs RSS Feed
InfoStealer malware plays a key role in many cyber attacks, enabling extortion and lateral movement via stolen credentials. Learn the fundamentals about InfoStealers in this article.| Packetlabs
T1071 | attack.mitre.org