| 
	     You are here  | 
        intezer.com | ||
| | | | | 
            
              www.huntandhackett.com
             | 
        |
| | | | | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post. | |
| | | | | 
            
              www.huntress.com
             | 
        |
| | | | | Huntress discovered RedCurl activity across several organizations in Canada going back to 2023. Learn more about how this APT operates and how they aim to remain undetected while exfiltrating sensitive data. | |
| | | | | 
            
              www.coveware.com
             | 
        |
| | | | | In Q2 2023 a series of ransomware attacks by similar threat actors created headlines and blurred the lines of attribution. | |
| | | | | 
            
              auditboard.com
             | 
        |
| | | Why wait until a disaster strikes? Find out how to prevent cybersecurity breaches today with all of our helpful tips. Keep reading to learn more! | ||