Advanced Persistent Threat (APT) groups are constantly evolving their techniques to evade detection. Kaspersky Labs has recently uncovered a sophisticated method employed by the ToddyCat group: hiding their malicious activity within the context of legitimate security software. In early 2024, Kaspersky’s investigation into ToddyCat incidents revealed a suspicious file named “version.dll” on multiple devices. This […]
The post CVE-2024-11859: ToddyCat Group Hides Malware in ESET’s Scanner to Bypass Security appeared first on Daily CyberSecurity.