all InfoSec news
New C2 framework leveraged by MuddyWater
June 30, 2023, 8:44 p.m. | SC Staff
SC Magazine feed for Threats www.scmagazine.com
Attacks by Iranian state-backed threat group MuddyWater, also known as Mango Sandstorm and Mercury, against Israeli research institute Technion, as well as PaperCut servers have involved the utilization of the PhonyC2 post-exploitation command-and-control framework.
attacks c2 framework command control exploitation framework iranian israeli mango mango sandstorm mercury muddywater papercut post-exploitation research sandstorm servers state technion threat threat group threats
More from www.scmagazine.com / SC Magazine feed for Threats
Novel Kaolin RAT malware distributed in Lazarus Group attacks
5 days, 18 hours ago |
www.scmagazine.com
How GenAI Can Improve SecOps - Ely Kahn - ESW #359
6 days, 22 hours ago |
www.scmagazine.com
New tool used in China-linked attacks against Asia-Pacific
1 week, 2 days ago |
www.scmagazine.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Application Security Engineer - Remote Friendly
@ Unit21 | San Francisco,CA; New York City; Remote USA;
Cloud Security Specialist
@ AppsFlyer | Herzliya
Malware Analysis Engineer - Canberra, Australia
@ Apple | Canberra, Australian Capital Territory, Australia
Product CISO
@ Fortinet | Sunnyvale, CA, United States
Manager, Security Engineering
@ Thrive | United States - Remote