State-Sponsored Cyberspies Use Sophisticated Server Firewall Bypass Technique

A threat actor — likely a state-sponsored cyberespionage group — has used a sophisticated technique to allow a piece of malware hosted on a server to communicate with command and control (C2) servers through a firewall.

read more

Read more: State-Sponsored Cyberspies Use Sophisticated Server Firewall Bypass Technique

Story added 25. February 2020, content source with full text you can find at link above.