The Lazarus group, linked to North Korean actors, has been targeting IIS servers to deploy malicious ASP web shells, facilitating the spread of malware, including the LazarLoader variant. These attacks involve exploiting web server vulnerabilities and use C2 servers to maintain stealth and longevity in cyber operations. Cybersecurity firm AhnLab has recommended regular security audits, stronger authentication, up-to-date software, and constant network traffic monitoring as safeguards against such attacks.

Moving Beyond Awareness: How Threat Hunting Builds Readiness
Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween