Aug. 28, 2023, 6:53 a.m. | Eswar

Cyber Security News cybersecuritynews.com

Recent reports reveal that Smoke loader botnets are used by malicious actors to infiltrate compromised systems and deploy Wi-Fi scanning executables. This Wi-Fi scanning tool seems custom-written and is used for gathering information about a system’s geolocation through Google Geolocation API. This malware has been termed Whiffy recon and uses nearby Wi-Fi access points to […]


The post Smoke Loader Malware Locates Infected System Wi-Fi Access Points appeared first on Cyber Security News.

access access points api botnets compromised deploy gathering gathering information geolocation google information loader malicious malicious actors malware points recon reports scanning smoke smoke loader system systems tool whiffy whiffy recon wi-fi wifi written

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC