|
You are here |
www.cybereason.com | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
cyble.com
|
|
| | | | | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns. | |
| | | | |
blog.eclecticiq.com
|
|
| | | | | Arda Buyukkaya reveals how the Black Basta Ransomware-as-a-Service (RaaS) group used an automated brute forcing framework to target edge network devices of its victims. | |
| | | | |
blog.fox-it.com
|
|
| | | Fox-IT (part of NCC Group) has uncovered a large-scale exploitation campaign of Citrix NetScalers in a joint effort with the Dutch Institute of Vulnerability Disclosure (DIVD). An adversary appears to have exploited CVE-2023-3519 in an automated fashion, placing webshells on vulnerable NetScalers to gain persistent access. The adversary can execute arbitrary commands with this webshell,... | ||