The sophistication of cyber threats is reaching new heights, with attackers exploiting both custom backdoors and legitimate tools to infiltrate networks. The Chinese hacking group Winnti has been leveraging a PHP backdoor named Glutton to target other threat actors, as well as industries in the U.S. and China. In Thailand, government officials are under siege from a campaign deploying a backdoor named Yokai. Using DLL side-loading techniques, the attackers disguise Windows shortcut files as official U.S. government documents. Meanwhile, a new report sheds light on the increasing abuse of legitimate Microsoft tools in cyber incidents. Read on for more.