Feb. 1, 2024, 12:18 a.m. | SC Staff

SC Magazine feed for Risk Management www.scmagazine.com

More sophisticated attack techniques have been integrated into the updated version of the Zloader malware also known as Silent Night, DELoader, and Terdot distributed in a campaign almost two years after the botnet had its infrastructure disrupted, according to The Hacker News.

attack attack techniques botnet campaign distributed endpointdevice-security hacker infrastructure malware ransomware silent techniques the hacker news version zloader

More from www.scmagazine.com / SC Magazine feed for Risk Management

Information Technology Specialist II: Information Security Engineer

@ WBCP, Inc. | Pasadena, CA.

Director of the Air Force Cyber Technical Center of Excellence (CyTCoE)

@ Air Force Institute of Technology | Dayton, OH, USA

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Cybersecurity Analyst - Digital Cybersecurity Analytics

@ Target | 7000 Target Pkwy N,NCD-0375 Brooklyn Park,MN 55445

Security Consulting Automation Developer (Unit 42)

@ Palo Alto Networks | Reston, VA, United States

Technical Consultant - Microsoft

@ AppDirect | Chicago, United States