Threat Hunter TeamSymantecPosted: 20 Jun, 20245 Min ReadThreat IntelligenceSustained Campaign Using Chinese Espionage Tools Targets TelcosAttackers were heavily focused on telecoms operators in a single Asian country.Sustained Campaign Using Chinese Espionage Tools Targets Telcos
Yuanjing GuoSoftware EngineerPosted: 27 Aug, 20244 Min ReadUnveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive DataA look at eight Android and iOS apps that fail to protect sensitive user data. Unveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive Data
Threat Hunter TeamSymantecPosted: 20 Aug, 20242 Min ReadNew Backdoor Targeting Taiwan Employs Stealthy CommunicationsPreviously unseen backdoor communicates with command-and-control server using DNS traffic.New Backdoor Targeting Taiwan Employs Stealthy Communications
Threat Hunter TeamSymantecPosted: 7 Aug, 20249 Min ReadCloud Cover: How Malicious Actors Are Leveraging Cloud ServicesIn the past year, there has been a marked increase in the use of legitimate cloud services by attackers, including nation-state actors.Cloud Cover: How Malicious Actors Are Leveraging Cloud Services
Nguyen Hoang GiangSenior Threat Analysis EngineerPosted: 25 Jul, 20243 Min ReadGrowing Number of Threats Leveraging AIThreat actors utilizing Large Language Model (LLM) AIs to generate code used in malware campaigns.Growing Number of Threats Leveraging AI
Threat Hunter TeamSymantecPosted: 23 Jul, 20246 Min ReadDaggerfly: Espionage Group Makes Major Update to ToolsetAPT group appears to be using a shared framework to create Windows, Linux, macOS, and Android threats.Daggerfly: Espionage Group Makes Major Update to Toolset