New Wslink Malware Loader Runs as a Server and Executes Modules in Memory
Cybersecurity researchers on Wednesday took the wraps off a "simple yet remarkable" malware loader for malicious Windows binaries targeting Central Europe, North America and the Middle East. Codenamed "Wslink" by ESET, this previously undocumented malware stands apart from the rest in that it runs as a server and executes received modules in memory. There are no specifics available on the
from The Hacker News https://ift.tt/3vQdweh
via IFTTT
from The Hacker News https://ift.tt/3vQdweh
via IFTTT
Comments
Post a Comment