Explore >> Select a destination


You are here

www.welivesecurity.com
| | blog.talosintelligence.com
1.4 parsecs away

Travel
| | Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims' host.
| | blog.eclecticiq.com
1.4 parsecs away

Travel
| | EclecticIQ researchers observed multiple weaponized phishing emails probably targeting the Security Service of Ukraine (SSU), NATO allies like Latvia, and private companies, Culver Aviation.
| | www.trendmicro.com
3.6 parsecs away

Travel
| | Water Orthrus has been active recently with two new campaigns. CopperStealth uses a rootkit to install malware on infected systems, while CopperPhish steals credit card information. This blog will provide the structure of the campaign and how they work.
| | www.lampysecurity.com
23.4 parsecs away

Travel
| Working in computer security requires a passion for learning. Not just because the attacks and defenses constantly change but because there is so much to learn. There is OSINT, hardware hacking, malware development, Penetration testing, exploit development, cryptography, etc. The list can go on forever. Learning everything would take over a lifetime, but they still build off one another. For this reason, I find myself learning something new almost every day.The resource I have focused on in the