Trend Micro has found that some cyber-attacks rely on maliciously crafted JPEG files to perform updates on themselves or to deploy new threats. The image files contain encrypted data that the company researchers managed to extract and thus analyze the content, which consists in configuration files and binaries. Tracked to websites located in the Asia-Pacific […]
Latest Comments