Communication
-
Blog
QR codes bypass browser isolation for malicious C2 communication
Mandiant has identified a novel method to bypass browser isolation technology and achieve command-and-control operations through QR codes. Browser isolation is an increasingly popular security technology that routes all local web browser requests through remote web browsers hosted in a cloud environment or virtual machines. Any scripts or content on the visited web page is executed on the remote browser rather…
Read More » -
Blog
Criminals Use Malware to Steal Near Field Communication Data
Recent research by cybersecurity company ESET provides details about a new attack campaign targeting Android smartphone users. The cyberattack, based on both a complex social engineering scheme and the use of a new Android malware, is capable of stealing users’ near field communication data to withdraw cash from NFC-enabled ATMs. Constant technical improvements from the threat actor As noted by…
Read More »