all InfoSec news
GuLoader Malware Using Malicious NSIS Executable to Target E-Commerce Industry
Feb. 6, 2023, 12:36 p.m. | info@thehackernews.com (The Hacker News)
The Hacker News thehackernews.com
The malspam activity is notable for transitioning away from malware-laced Microsoft Word documents to NSIS executable files for loading the malware. Other countries targeted as part of the campaign include Germany, Saudi Arabia,
campaign commerce countries cybersecurity documents e-commerce end files germany guloader industry korea malicious malspam malware malware campaign microsoft microsoft word saudi saudi arabia south south korea target trellix word
More from thehackernews.com / The Hacker News
Recover from Ransomware in 5 Minutes—We will Teach You How!
1 day, 4 hours ago |
thehackernews.com
How to Conduct Advanced Static Analysis in a Malware Sandbox
1 day, 5 hours ago |
thehackernews.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Security Engineer, Incident Response
@ Databricks | Remote - Netherlands
Associate Vulnerability Engineer - Mid-Atlantic region (Part-Time)
@ GuidePoint Security LLC | Remote in VA, MD, PA, NC, DE, NJ, or DC
Data Security Architect
@ Accenture Federal Services | Washington, DC
Identity Security Administrator
@ SailPoint | Pune, India