This new malware utilizes a rare programming language to evade traditional detection methods

New custom malware loader written in JPHP is wreaking havoc The custom payload is difficult to…

Continue Reading

This new phishing strategy utilizes GitHub comments to distribute malware

Github repositories are being infected with malware Trusted repositories can bypass secure web gateways Github comments…

Continue Reading