A rare Unicode character, the right-to-left override (RTLO), can make executable files appear as harmless Word or image documents. This trick is increasingly used in malware campaigns, highlighting ...
Researchers call it an evolution from earlier versions and not a leap forward, but still advise CSOs to better secure ESXi hosts.
Backdoor on edge devices allowed a starting point for threat actors to use lateral movement to access VMware vCenter and ESXi hosts, Windows workstations and servers and Microsoft 365 mailboxes.