Explore >> Select a destination


You are here

diverto.github.io
| | www.preludesecurity.com
2.0 parsecs away

Travel
| | Explore MITRE ATT&CK techniques used by Scattered Spider in major recent UK retailer cyberattacks and how to evaluate your own organization's defenses.
| | www.uptycs.com
3.6 parsecs away

Travel
| | Uptycs identified an XLS document that downloaded a payload named Warzone RAT that can steal credentials and log keystrokes.
| | www.cybereason.com
2.9 parsecs away

Travel
| | Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data...
| | blog.gitguardian.com
14.7 parsecs away

Travel
| EO 14028 is bringing a lot of new security documentation requirements with it. Here's how SCA can help with creating that documentation.