ThreatDown’s EDR team discovered a sophisticated, multi-stage attack chain during an active investigation; the first documented case of attackers abusing the Deno runtime as a malware execution ...
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.
Generally speaking, you don't really want to be downloading anything from the dark web, if you can help it: The dark web waters are swimming with malware, scams, and otherwise unwholesome material.
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.