threat-actor

Preview image for: Acoustic Covert Ops: Deconstructing the .WAV File Malware Vector

Acoustic Covert Ops: Deconstructing the .WAV File Malware Vector

In-depth analysis of threat actors weaponizing .WAV files for malware delivery, focusing on steganography, forensic detection, and defensive strategies.
Preview image for: Axios NPM Compromise: A Deep Dive into Supply Chain Vulnerability and Precision Threat Actor Tactics

Axios NPM Compromise: A Deep Dive into Supply Chain Vulnerability and Precision Threat Actor Tactics

Axios NPM package briefly compromised, exposing supply chain risks. Analysis of suspected North Korean threat actor tactics and defensive strategies.
Preview image for: Silver Fox's Evolving Threat Landscape: A Deep Dive into Dual Espionage Cyber Campaigns

Silver Fox's Evolving Threat Landscape: A Deep Dive into Dual Espionage Cyber Campaigns

Silver Fox group shifts from tax lures to WhatsApp stealers, blending espionage with phishing for dual-purpose data theft and intelligence gathering.
Preview image for: Threat Actor Weaponizes Elastic Cloud SIEM for Covert Data Management Post-Exploitation

Threat Actor Weaponizes Elastic Cloud SIEM for Covert Data Management Post-Exploitation

Huntress uncovers a sophisticated campaign where threat actors exploit vulnerabilities to steal data, then manage it using Elastic Cloud SIEM.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics