Category: Information Security

Kimsuky

Inside Kimsuky’s GitHub-Powered Cyber-Espionage Campaign

At the beginning of 2025, Trellix specialists uncovered a sweeping cyber-espionage campaign targeting diplomatic missions in Seoul. Between March and July, at least nineteen phishing attacks were recorded, in which North Korean–linked actors impersonated...

C2 servers

The State of Cybercrime: How C2 Servers Fuel the Global Threat

Experts at Censys have released their State of the Internet 2025 report, focusing on the infrastructure of cybercriminals—specifically Command-and-Control (C2) servers and other tools used to coordinate attacks and maintain access to compromised systems....