|
You are here |
santandersecurityresearch.github.io | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
thehackernews.com
|
|
| | | | | Fake Android apps mimicking popular platforms like Google & WhatsApp are stealing user data. | |
| | | | |
securityinaction.wordpress.com
|
|
| | | | | TL; DR In recent months threat actors have been leveraging alternative means of compromising Windows based systems in order to evade detection. Make certain to download and install software from legitimate sources and where possible make use of the Windows driver blocklist (further recommendations listed below). ==================== By employing techniques such as DLL sideloading (defined... | |
| | | | |
bdtechtalks.com
|
|
| | | Security researchers find critical flaws in popular Axis cameras, allowing full remote control over thousands of surveillance systems in enterprises worldwide. | ||