|
You are here |
www.cybereason.com | ||
| | | | |
blog.eclecticiq.com
|
|
| | | | | Arda Buyukkaya reveals how the Black Basta Ransomware-as-a-Service (RaaS) group used an automated brute forcing framework to target edge network devices of its victims. | |
| | | | |
www.trendmicro.com
|
|
| | | | | While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
www.knostic.ai
|
|
| | | Demonstrating code injection in VS Code and Cursor: exploitation vectors, real examples, and practical defenses for developers. | ||