ShadowHammer: New details
It appears the ASUS incident was just one part of the large-scale operation.
8 articles
It appears the ASUS incident was just one part of the large-scale operation.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
A new APT attack targets the diplomatic mission of an Asian country.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
Our technologies detected a threat that seems to be one of the biggest supply-chain attacks ever.