Covert

Chinese Experts Uncover Details of Equation Group's Bvp47 Covert Hacking Tool

Researchers from China's Pangu Lab have disclosed details of a "top-tier" backdoor put to use by the Equation Group, an… Read More

2 years ago

Researcher Finds that Google Play Sign-Ins can Allow Covert Location-Tracking

Google will record the location of whatever phone a person has logged into. So, it’s not even necessary for someone… Read More

3 years ago

Security Experts Tie Covert Wiper Tool to Iranian Railway Infrastructure Hacking Attempt

Security experts at SentinelOne have come across a previously unidentified data-scrubbing malware tool that was a portion of an uncontrollable… Read More

3 years ago

Ferocious Kitten: 6 years of covert surveillance in Iran

Interestingly, some of the TTPs used by this threat actor are reminiscent of other groups that are active against a… Read More

3 years ago

Pingback Malware Using ICMP for Covert Communication

A new Windows malware called Pingback has been found using DLL hijacking attack to target Microsoft Windows 64-bit systems. The… Read More

3 years ago

IGI 2: Covert Strike Download For Windows PC

If you want to download IGI 2: Covert Strike on a Windows 10 PC then you have landed on the… Read More

3 years ago