April 1, 2024, 12:55 p.m. | Tushar Subhra Dutta

GBHackers On Security gbhackers.com

Active since 2023, the Mysterious Werewolf cluster has shifted targets to the military-industrial complex (MIC) by using phishing emails with a weaponized archive.  The archive contains a seemingly legitimate PDF document along with a malicious CMD file, and when the victim opens the archive and double-clicks the PDF, the CMD file executes, deploying the RingSpy […]


The post Werewolf Hackers Exploiting WinRAR Vulnerability To Deploy RingSpy Backdoor appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News …

archive backdoor clicks cluster cyber security deploy document emails exploiting file hackers industrial malicious malware mic military pdf phishing phishing emails victim vulnerability winrar

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts