Explore >> Select a destination


You are here

lab52.io
| | blog.talosintelligence.com
7.9 parsecs away

Travel
| | * Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure the victim into downloading and executing malware. * This campaign abuses Google's
| | securityinaction.wordpress.com
8.7 parsecs away

Travel
| | TL; DR In recent months threat actors have been leveraging alternative means of compromising Windows based systems in order to evade detection. Make certain to download and install software from legitimate sources and where possible make use of the Windows driver blocklist (further recommendations listed below). ==================== By employing techniques such as DLL sideloading (defined...
| | cyble.com
9.1 parsecs away

Travel
| | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns.
| | www.kusari.dev
40.3 parsecs away

Travel
| Kusari expert blog about National Security Agency (NSA) Recommendations for SBOM Management; one important aspect not in their report