Topic: obfuscation techniques

  • Russian APT28 Deploys 'NotDoor' Backdoor to Target Microsoft Outlook

    Russian APT28 Deploys 'NotDoor' Backdoor to Target Microsoft Outlook

    A new sophisticated backdoor called NotDoor, attributed to Russian state-aligned group APT28, targets Microsoft Outlook to exfiltrate data and execute remote commands. The malware uses obfuscated VBA code and triggers from specific email phrases to deploy malicious actions, while employing evasio...

    Read More »
  • 6 Browser Threats Your Security Team Must Prepare for in 2025

    6 Browser Threats Your Security Team Must Prepare for in 2025

    The browser is now a primary attack surface for cyber threats, targeting cloud applications and corporate data through sophisticated campaigns. Key browser-based threats include phishing for credentials and sessions, malicious code delivery, and malicious OAuth integrations, which bypass traditio...

    Read More »
  • Trusted Chrome VPN Caught Spying on Users

    Trusted Chrome VPN Caught Spying on Users

    A trusted Chrome VPN extension, FreeVPN.One, was revealed to be spyware that secretly harvested user data, including screenshots of browsing activity, after deceptive updates. The malicious behavior involved a two-stage process using injected scripts and delays to capture screenshots via Chrome's...

    Read More »