 
      
    | You are here | www.huntandhackett.com | ||
| | | | | www.reco.ai | |
| | | | | Discover how APT36's ElizaRAT, an evolving malware, leverages cloud services like Slack and Google Drive for cyber espionage. | |
| | | | | www.preludesecurity.com | |
| | | | | Explore MITRE ATT&CK techniques used by Scattered Spider in major recent UK retailer cyberattacks and how to evaluate your own organization's defenses. | |
| | | | | blog.talosintelligence.com | |
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | | www.sonatype.com | |
| | | Learn about evolving malware threats, proactive defense strategies, and the role of software composition analysis to protect your development processes. | ||