Ransomware groups and state-sponsored actors are increasing the use of data exfiltration to maximize extortion and intelligence gains, using legitimate and custom tools to steal sensitive information. This approach is less resource-intensive and harder to detect, making it more attractive. The use of cloud storage and file-sharing platforms to host stolen data is also on the rise. Businesses need to implement robust security measures, such as network monitoring, file integrity checks, and endpoint detection, to mitigate risks.
The first UEFI bootkit malware for Linux has been detected, so users beware
ESET researchers have revealed a first-of-its-kind Linux UEFI bootkit, named ‘Bootkitty’, which could pose a significant risk despite being in early stages of development. The