Researchers uncovered new worming second-stage tools used to locally exfiltrate data from air gapped ICS environments, putting threat actors one step away from transmission of the info to a C2.

- July 31, 2023
- by
- Cyber News, Cyber Threat Trends
- Less than a minute
- 237 Views
Related Post
- by Francis Schmuff
- May 5, 2025
⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake
What if attackers aren’t breaking in—they’re already inside, watching, and adapting? This week showed a sharp rise in stealth tactics
- by Francis Schmuff
- May 5, 2025
Perfection is a Myth. Leverage Isn’t: How Small
Let’s be honest: if you’re one of the first (or the first) security hires at a small or midsize business,
- by Francis Schmuff
- May 5, 2025
Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials
The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2 and TerraLogger, suggesting
- by Francis Schmuff
- May 3, 2025
Malicious Go Modules Deliver Disk-Wiping Linux Malware in
Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite