New USBCulprit Espionage Tool Steals Data From Air-Gapped Computers

A Chinese threat actor has developed new capabilities to target air-gapped systems in an attempt to exfiltrate sensitive data for espionage, according to a newly published research by Kaspersky yesterday. The APT, known as Cycldek, Goblin Panda, or Conimes, employs an extensive toolset for lateral movement and information stealing in victim networks, including previously unreported custom

via The Hacker NewsMore information
  1. Pentest Blog
  2. Hacker
  3. Basic Pentest 1 Walkthrough
  4. Pentest Services
  5. Pentest Kit
  6. Hacking Tutorials
  7. Pentest Checklist
  8. Hacking Link
  9. Pentest Red Team

Post a Comment

Previous Post Next Post