Share

ESET researchers show how Turla has refreshed its malicious toolkit and how, in an effort to evade detection, the group uses PowerShell to inject malware directly into memory

ESET researchers show how Turla has refreshed its malicious toolkit and how, in a bid to evade detection, the infamous APT group uses PowerShell to inject malware directly into memory. Also this week, Tony shares what happened after he became the victim of a data breach and his payment card details fell into the wrong hands. All this – and more – on WeLiveSecurity.

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)