DeXpose Blog

Researches, News, and more

Categories

Filters
Reset

Top Articles

Mustang Panda

Threat Actor Profile: Mustang Panda

Mustang Panda is a sophisticated Chinese state-aligned cyberespionage group active since at least 2012. The group primarily targets government agencies, NGOs, think tanks, religious organizations, and private companies with geopolitical relevance to China’s strategic interests.…

Egypt Post Impersonation Linked to Smishing Triad

A recently observed phishing campaign impersonating Egypt Post (البريد المصري) has been attributed to the Smishing Triad, a well-documented cybercriminal group for their phishing (smishing) campaigns across multiple countries. The campaign impersonates Egypt Post, aiming to steal credentials and…

Flesh Stealer: A Report on Multivector Data Theft

Introduction FleshStealer is a sophisticated, modular, and obfuscated .NET-based information-stealing malware designed for comprehensive data exfiltration from Windows systems. Its architecture is built for scale and stealth, utilizing multithreading to simultaneously run multiple data harvesting…

Understanding SalatStealer: Features and Impact

Introduction Salat Stealer is a stealthy malware developed in the Go programming language, designed to infiltrate systems and extract sensitive data. Once it infects a device, it gathers extensive system information, such as hard drive…

How Dark web Monitoring Protects Your business

Dark web monitoring is a crucial step for businesses to safeguard their sensitive data. This process involves scanning the dark web for compromised information, such as stolen credentials and proprietary data. Data breaches can have…