Cybersecurity Malware

CRIGENT malware

TrendMicro has released a new report which reveals the methods the CRIGENT malware used to operate. The malware researchers from Trendmicro explained that the CRIGENT malware used the TOR networks to stay hidden and that it used the Windows Powershell function to install and spread malicious codes. This is not the first malware which used […]