Explore >> Select a destination


You are here

intezer.com
| | www.cybereason.com
3.3 parsecs away

Travel
| | Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data...
| | blog.talosintelligence.com
2.8 parsecs away

Travel
| | * Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure the victim into downloading and executing malware. * This campaign abuses Google's
| | blog.cyber5w.com
3.4 parsecs away

Travel
| | understanding how Event logs work in windows and how to analyze them
| | www.shakudo.io
18.6 parsecs away

Travel
| Find out how Generative AI is reshaping cybersecurity-enhancing threat detection while introducing new risks.