Dec. 20, 2023, 3 p.m. | Ghanashyam Satpathy

Threat Labs - Netskope www.netskope.com

Summary Threat actors often employ stealthy attack techniques to elude detection and stay under the defender’s radar. One way they do so is by using uncommon programming languages to develop malware. Using an uncommon programming language to develop malware provides several benefits, including: Evading some signature based detections Impeding analysis by malware analysts that are […]


The post A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government appeared first on Netskope.

attack attack techniques benefits campaign defender detection docs government language languages malware microsoft microsoft word nim programming programming language radar techniques threat threat actors threat labs uncommon under word

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Director, Cybersecurity - Governance, Risk and Compliance (GRC)

@ Stanley Black & Decker | New Britain CT USA - 1000 Stanley Dr

Information Security Risk Metrics Lead

@ Live Nation Entertainment | Work At Home-Connecticut

IT Product Owner - Enterprise DevSec Platform (d/f/m)

@ Airbus | Hamburg - Finkenwerder

Senior Information Security Specialist

@ Arthur Grand Technologies Inc | Arlington, VA, United States

Information Security Controls SME

@ Sword | Aberdeen, Scotland, United Kingdom