Featured on DR Global Articles

Man at a window with binoculars
Cyberattacks & Data Breaches
'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks

The threat cluster hasn't been seen before, but its custom Windows server backdoors have researchers intrigued thanks to their extremely effective stealth mechanisms.

More from DR Global Articles

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.