Threat Hunter TeamSymantecPosted: 20 Jun, 20245 Min ReadThreat IntelligenceSustained Campaign Using Chinese Espionage Tools Targets TelcosAttackers were heavily focused on telecoms operators in a single Asian country.Sustained Campaign Using Chinese Espionage Tools Targets Telcos
Threat Hunter TeamSymantecPosted: 2 Oct, 20245 Min ReadStonefly: Extortion Attacks Continue Against U.S. TargetsAttacks continue after indictment naming North Korean suspect.Stonefly: Extortion Attacks Continue Against U.S. Targets
Threat Hunter TeamSymantecPosted: 12 Sep, 20243 Min ReadRansomware: Attacks Once More Nearing Peak LevelsAttacks surge again in second quarter of 2024 as attackers bounce back from disruption.Ransomware: Attacks Once More Nearing Peak Levels
Yuanjing GuoSoftware EngineerPosted: 27 Aug, 20244 Min ReadUnveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive DataA look at eight Android and iOS apps that fail to protect sensitive user data. Unveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive Data
Threat Hunter TeamSymantecPosted: 20 Aug, 20242 Min ReadNew Backdoor Targeting Taiwan Employs Stealthy CommunicationsPreviously unseen backdoor communicates with command-and-control server using DNS traffic.New Backdoor Targeting Taiwan Employs Stealthy Communications
Threat Hunter TeamSymantecPosted: 7 Aug, 20249 Min ReadCloud Cover: How Malicious Actors Are Leveraging Cloud ServicesIn the past year, there has been a marked increase in the use of legitimate cloud services by attackers, including nation-state actors.Cloud Cover: How Malicious Actors Are Leveraging Cloud Services