'Elusive Comet' Attackers Use Zoom to Swindle Victims
The threat actor uses sophisticated social engineering techniques to infect a victim's device, either with an infostealer or remote access Trojan (RAT).

Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Apr 21, 2025 0
Or register with email
Jan 26, 2025 0
Jan 27, 2025 0
Jan 28, 2025 0
Jan 28, 2025 0
Jan 29, 2025 0
Jan 30, 2025 1
Jan 29, 2025 0
Jan 28, 2025 0
This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.