Remove Malware Remove Network Remove Open Source Remove Systems Administration
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

The threat actors use social engineering to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems. They use the apps to gain access to the victim's computer and install malware across the network environment, stealing private keys and exploiting other security gaps.

Malware 73
article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. Armed with this spcific knowledge that others in your industry have been victim to these tactics before, you can then fortify your own networks against specific tactics.

Tools 40