![]() ![]() Qakbot Infrastructure Takedown, UNC4841 Exploits Barracuda Zero-Day Music and Malicious Behavior – Six Warnings Signs to Look out For LUCR-3: Scattered Spider Getting SaaS-y in the CloudĬontainment in the Cloud – Their Native Firewalls Don’t Always Work What’s the point of press releases from threat actors? Behind the Scenes of BBTok: Analyzing a Banker’s Server Side Components.Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos.18th September – Threat Intelligence Report.Will the Real Slim Shady Please Stand Up? Check Point Research Exposes Cybercriminal Behind Malicious Software Impacting EMEA and APAC.Sintesi riepilogativa delle campagne malevole nella settimana 16 – 22 Settembre 2023 Silent Skimmer: Online Payment Scraping Campaign Shifts Targets From APAC to NALA Stop Phishing Yourself: How Auto-Forwarding and Exchange Contacts Can Stab You in the Back Hayden Covington at Black Hills Information Security.Ransomware Groups Pivoting Away from Encryption PowerShell: Great Ransomware Tool or Greatest Ransomware Tool?ĭetection Engineering and SOC Scalability Challenges (Part 2)Įmulating the Controversial and Intriguing Rhysida Ransomwareīreaking Down the Remcos Malware Attempts on Colombian Banks Unmasking a Sophisticated Phishing Campaign That Targets Hotel Guests ![]() Threat Intelligence with MISP: Part 2 - Setting up MISP PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions Bill Marczak, John Scott-Railton, Daniel Roethlisberger, Bahr Abdul Razzak, Siena Anstis, and Ron Deibert at The Citizen Lab.iOS 17 Forensics: Another Year, Another Byte of the AppleĪ Complete Guide for SQL Database Recovery. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |