SEARCH

    Saved articles

    You have not yet added any article to your bookmarks!

    Browse articles
    Select News Languages

    GDPR Compliance

    We use cookies to ensure you get the best experience on our website. By continuing to use our site, you accept our use of cookies, Privacy Policies, and Terms of Service.

    ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

    1 week ago

    Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka APT37) to deliver a malware known as RokRAT. The activity has been codenamed Operation HanKook Phantom by Seqrite Labs, stating the attacks appear to target individuals associated with the National Intelligence Research Association, including academic figures
    Click here to Read more
    Prev Article
    Lyon snatch last-gasp home victory over 10-man Marseille
    Next Article
    Israel’s New Negotiating Stance Is Likely to Prolong Gaza War, Experts Say

    Related Technology Updates:

    Comments (0)

      Leave a Comment