Jan. 30, 2023, 5:48 a.m. | Pierluigi Paganini

Security Affairs securityaffairs.co

The threat actors behind the GOOTLOADER malware continues to improve their code by adding new components and implementing new obfuscation techniques. Mandiant researchers reported that the UNC2565 group behind the GOOTLOADER malware (aka Gootkit) continues to improve their code by adding new components and implementing new obfuscation techniques. Gootkit runs on an access-a-as-a-service model, it is used […]


The post UNC2565 threat actors continue to improve the GOOTLOADER malware appeared first on Security Affairs.

access as-a-service breaking news code continue cybercrime gootkit gootloader information security news it information security malware mandiant obfuscation pierluigi paganini researchers service techniques threat threat actors unc2565

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Team Lead, Security Operations Center, Cyber Risk

@ Kroll | United Kingdom

Cyber Security Risk Analyst

@ College Board | Remote - Virginia

Lead - IT Security Engineer

@ Bosch Group | BENGALURU, India

Project Cybersecurity Manager

@ Alstom | Bengaluru, KA, IN

Security Consultant

@ CloudSEK | Bengaluru, Karnataka, India