A threat actor tracked as WASP is behind an ongoing supply chain attack targeting Python developers with the WASP Stealer.…
Cyber espionage group Worok abuses Dropbox API to exfiltrate data via using a backdoor hidden in apparently innocuous image files. Researchers…
Experts discovered a malicious package on the Python Package Index (PyPI) that uses steganographic to hide malware within image files.…
A cyberespionage group, tracked as Witchetty, used steganography to hide a previously undocumented backdoor in a Windows logo. Broadcom's Symantec…
Experts spotted a new version of the IcedID banking trojan that uses steganography to infect victims as part of COVID-19…
A newly discovered malware campaign leverages steganography to hide GandCrab ransomware in an apparently innocent Mario image. Security experts at…
Yoroi ZLab – Cybaze uncovered a new wave of Ursnif attacks using a variant that implements an exotic process injection…
Experts discovered PDF exploit that was using steganography to hide malicious JavaScript code in images embedded in PDF files. The…
A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security…
Experts at Dr Web discovered dozens of Android game apps in the Google Play Store have been infected with the…
This website uses cookies.