Tag: Dragons
-
Popular Dragon Touch Tablet for Kids Infected with Corejava Malware
The Dragon Touch KidzPad Y88X 10 tablet on Amazon, analyzed by EFF researchers, also comes with preinstalled riskware and an outdated …
-
USB Drives Used as Trojan Horses By Camaro Dragon
The malicious software tools were discovered by Check Point Research (CPR) as part of an attack against a healthcare institution in Europe …
-
Novel TinyNote backdoor leveraged in Camaro Dragon attacks
New attacks by Chinese state-backed threat operation Camaro Dragon, which overlaps with Mustang Panda, have involved the novel Go-based …
-
Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
The Chinese nation-stage group known as Camaro Dragon has been linked to yet another backdoor that’s designed to meet its …
-
Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry
An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its attacks by …
-
Southeast Asia and Australia Orgs Targeted by Aoqin Dragon Hackers for Ten Years
A new advanced persistent threat (APT) actor dubbed Aoqin Dragon and reportedly based in China, has been linked to several hacking attacks …
-
Kimsuki hackers use commodity RATs with custom Gold Dragon malware
South Korean researchers have spotted a new wave of activity from the Kimsuky hacking group, involving commodity open-source remote access …
-
Train Your Dragons: 3 Quick Tips for Harnessing Industrial IoT Value
How to train your [IIoT] dragons… While industrial IoT projects have many stakeholders across the enterprise, three key roles are most …
-
A Game of Risk with Broadcasters, Cyber Felons and Dragons
Submitted by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there’s money, there has always been crime. But what if money …
-
Gold Dragon Helps Olympics Malware Attacks Gain Permanent Presence on Systems, Reports McAfee
A report recently released by McAfee Advanced Threat Research (ATR) revealed a fileless attack targeting organizations involved with the …
●●●