Storm-2561 spreads fake VPN installers via SEO poisoning and GitHub downloads, stealing enterprise VPN credentials with Hyrax malware.
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.
During the unprecedented escalation of the current 2026 cyber and kinetic war involving Iran, Israel and the United States, understanding the adversary's playbook is more critical than ever.
Attila covers software, apps and services, with a focus on virtual private networks. He's an advocate for digital privacy and has been quoted in online publications like Computer Weekly, The Guardian, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results