Explore >> Select a destination


You are here

blog.eclecticiq.com
| | blog.talosintelligence.com
1.8 parsecs away

Travel
| | By Flavio Costa, * In a recent customer engagement, we observed a month-long AvosLocker campaign. * The attackers utilized several different tools, including Cobalt Strike, Sliver and multiple commercial network scanners. * The initial ingress point in this incident was a pair of VMWare Horizon Unified Access Gateways that were vulnerable to Log4Shell.
| | www.cybereason.com
2.8 parsecs away

Travel
| | Email extortion campaign by threat actor group CL0P targets e-business suite users under CVE-2025-61882
| | thehackernews.com
1.6 parsecs away

Travel
| | Czechia and Germany reveal they were targets of a massive cyber espionage campaign by Russia-linked APT28 hacker group.
| | www.malwaretech.com
16.1 parsecs away

Travel
| A while ago some of you may remember me saying that I was so bored of there being no decent malware to reverse, that I might as well write some. Well, I decided to give it a go and I've spent some of my free time developing a Windows XP 32-bit bootkit. Now, before you get on the phone to your friendly neighborhood FBI agent, I'd like to make clear a few thing: The bootkit is written as a proof of concept, it would be very difficult to weaponize, and there is no weaponized version to fall into the hands of criminals. For those of you who don't know, a bootkit is a type of rootkit that begins executing at boot time. By infecting the BIOS, Master Boot Record, Volume Boot Record or Initial Program Loader; Malware can begin execution early on in the operating sys...