Recently we at K7 Labs came across a new strain of malware which abuses PowerShell and publicly available source code […]

K7 Labs
May 8, 2019
Recently we at K7 Labs came across a new strain of malware which abuses PowerShell and publicly available source code […]
TrueBot Delivery Mechanism TrueBot Trojans are used in targeted attacks for reconnaissance and use phishing as its primary leverage method. […]
For its distinctive attack techniques, but a lot more for the damage it causes, ransomware counts as one of the […]
Unity is strength – this age old adage is true for just about everyone, even the bad guys. It has […]
Introduction Cybersecurity in India is, sadly, a bit of a myth. Enterprises often jeopardize their security without fully realizing what’s […]