Endpoint Security
the outline of a horse that represents a trojan horse hidden in binary code
Vulnerabilities & ThreatsFlexible Structure of Zip Archives Exploited to Hide Malware UndetectedFlexible Structure of Zip Archives Exploited to Hide Malware Undetected
Attackers abuse concatenation, a method that involves appending multiple zip archives into a single file, to deliver a variant of the SmokeLoader Trojan hidden in malicious attachments delivered via phishing.
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.