Oct. 2, 2023, 5 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news


In the ever-evolving landscape of cybersecurity threats, it is imperative to maintain vigilance and adaptability. As we delve deeper into the realm of Adversary-in-the-Middle (AiTM) attacks, the second installment of this research series seeks to unravel the intricacies of two notorious tools, Evilginx and EvilQR.


In Part I, we comprehensively explored the evil capabilities of EvilProxy, shedding light on its advanced methodologies and the challenges it poses to organizations and individuals alike. Building upon that foundation, Part II …

adversary adversary-in-the-middle aitm attacks cybersecurity cybersecurity threats evil evilginx evilqr realm research series threats tools

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605