The Chinese cyberespionage group known as ToddyCat has been targeting high-profile organisations in Asia, primarily in the telecom and government sectors, through a malicious campaign dubbed “Stayin’ Alive,” according to researchers at Check Point Software Technologies and Kaspersky Lab. ToddyCat’s favoured technique is DLL side-loading, and the malware exploits vulnerabilities in Microsoft Exchange servers and delivers malware through spear-phishing emails.
Botnets leverage decade-old D-Link vulnerabilities in new attack campaigns
A new report from FortiGuard Labs has revealed the activities of two botnets, FICORA and CAPSAICIN, exploiting vulnerabilities in legacy D-Link devices. The report stresses