Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit | Curated by Alerts360

The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor. Get Alerted – Protect Your Systems
What's Your Reaction?
Like
0
Dislike
0
Love
0
Funny
0
Angry
0
Sad
0
Wow
0