<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Sneaky sneaky: Freight and logistics-targeting threat actor wields code-signing service to evade defenses and install ScreenConnect remote monitoring and management software.]]></title><description><![CDATA[<p>Sneaky sneaky: Freight and logistics-targeting threat actor wields code-signing service to evade defenses and install ScreenConnect remote monitoring and management software. The prolific threat actor remains focused on using malware to facilitate cargo theft, as well as monetizing targets in every other possible way (stealing cryptocurrency wallets, bank account details, PayPal log-ins, tax-prep software, and more.) <a href="https://www.databreachtoday.com/freight-hacker-wields-code-signing-service-to-evade-defenses-a-31433" rel="nofollow noopener"><span>https://www.</span><span>databreachtoday.com/freight-ha</span><span>cker-wields-code-signing-service-to-evade-defenses-a-31433</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/7564cc36-2c46-46ba-a485-9f6986d4f8fd/sneaky-sneaky-freight-and-logistics-targeting-threat-actor-wields-code-signing-service-to-evade-defenses-and-install-screenconnect-remote-monitoring-and-management-software.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 21:14:02 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/7564cc36-2c46-46ba-a485-9f6986d4f8fd.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 16 Apr 2026 09:36:40 GMT</pubDate><ttl>60</ttl></channel></rss>