Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

CRON#TRAP: Leveraging Emulated Environments for Covert Cyber Operations

Amber | Attack Report
Download PDF

A new phishing campaign known as CRON#TRAP is leveraging sophisticated techniques to deploy a tailored TinyCore Linux instance on Windows systems via QEMU. The campaign represents a significant evolution in cyber threat tactics, utilizing legitimate virtualization technology to enhance stealth and establish persistent backdoors on compromised systems.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox