Cyberattacks & Data Breaches
thumbnail
Cyberattacks & Data BreachesTurla Threat Group Uses Email PDF Attachments to Control Stealthy BackdoorTurla Threat Group Uses Email PDF Attachments to Control Stealthy Backdoor
The Russian-speaking group's latest tactic is the only known case of malware that's completely controllable via email, researchers at ESET say.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.