From cyware.com
- The Process Hollowing technique involves the use of VBScript, PowerShell, and the .NET framework.
- The capabilities of the NETWIRE trojan includes keylogging, reverse shell, and password theft.
Researchers have come across a new phishing campaign in which attackers targeted multiple customers by using a