Category Archives: Cyberattacks, Phishing

Auto Added by WPeMatico

Attackers leverage Cloudflare tunnels to obscure malware distribution

Cybercriminals regularly abuse free services to host malware or to set up command-and-control (C2) infrastructure because they know connections to such services won’t raise suspicion inside networks. Such is the case with TryCloudflare.com, which was recently abused in a widespread campaign to deliver remote access trojans (RATs). TryCloudflare is a tunneling feature that enables users […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.