The Chinese cyberespionage group known as ToddyCat has been targeting high-profile organisations in Asia, primarily in the telecom and government sectors, through a malicious campaign dubbed “Stayin’ Alive,” according to researchers at Check Point Software Technologies and Kaspersky Lab. ToddyCat’s favoured technique is DLL side-loading, and the malware exploits vulnerabilities in Microsoft Exchange servers and delivers malware through spear-phishing emails.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some