hii

PowerShell

Two variants of Tor2Mine invade into networks: Sophos study

Two variants of Tor2Mine invade into networks: Sophos study

“The presence of miners, like Tor2Mine, in a network is almost always a harbinger of other, potentially more dangerous intrusions.…

October 8, 2022

Sophos identifies top ways in which cybercriminals abuse Google Forms

“The extent to which cyberattackers abuse Google Forms came to light while we were researching how malware abuses encryption to…

September 27, 2021

Conti ransomware gang: An overview

Conti ransomware stands out as one of the most ruthless of dozens of ransomware gangs that we follow. The group…

June 24, 2021