Google exposes BadAudio malware used in APT24 espionage campaigns
(bleepingcomputer.com)
1.
2.
3.
North Korean hackers use EtherHiding to hide malware on the blockchain
(bleepingcomputer.com)
4.
Silk Typhoon hackers hijack network captive portals in diplomat attacks
(bleepingcomputer.com)