Image source: Shutterstock The threat actor is using email, DNS tunneling and an updated IIS backdoor to communicate with “Veaty” and “Spearal”, two new malware tools in its portfolio. Here’s what’s noteworthy about the…
Image source: Shutterstock The threat actor is using email, DNS tunneling and an updated IIS backdoor to communicate with “Veaty” and “Spearal”, two new malware tools in its portfolio. Here’s what’s noteworthy about the…