Woman with her hand hovering over a laptop keyboard in front of a screen display of a mailbox icon with a red danger circle
Threat IntelligenceFlexible Structure of Zip Archives Exploited to Hide Malware UndetectedFlexible Structure of Zip Archives Exploited to Hide Malware
Attackers abuse concatenation, a method that involves appending multiple zip archives into a single file, to deliver a variant of the SmokeLoader Trojan hidden in malicious attachments delivered via phishing.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.