Explore >> Select a destination


You are here

www.blog.thdctech.com
| | cocomelonc.github.io
3.5 parsecs away

Travel
| | [AI summary] The text describes a sophisticated phishing campaign using multiple exfiltration methods and professional social engineering tactics. It highlights the use of legitimate services like Telegram API and Firebase for malicious purposes, demonstrating advanced evasion techniques. The text also discusses the use of tLab Anti-APT for analyzing and detecting such attacks through automated methods like OCR, email fuzzing, and correlation analysis.
| | petrapixel.neocities.org
3.4 parsecs away

Travel
| | A cheatsheet / reference for common coding use cases and commands, for SCSS, JavaScript, git (and GitHub), npm, webpack and eleventy (11ty). Neocities.
| | blog.openreplay.com
2.3 parsecs away

Travel
| | Write reusable blocks of code and use them elsewhere
| | theconversation.com
23.9 parsecs away

Travel
| It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.