You are here |
cyble.com | ||
| | | |
marcoramilli.com
|
|
| | | | When I saw a threat actor hijacking the X account of Google's Mandiant division and promoting a cryptocurrency scam I suddenly became curious about this new | |
| | | |
reliaquest.com
|
|
| | | | From Oct to early Dec 2024, our customers observed nearly twice as many fake CAPTCHA websites compared to September, likely the result of researchers releasing the templates used for these campaigns. | |
| | | |
www.trendmicro.com
|
|
| | | | We uncovered a cyberespionage campaign targeting Middle Eastern countries. We named this campaign "Bouncing Golf" based on the malware's code in the package named "golf." | |
| | | |
www.cybereason.com
|
|
| | Over the last five years ransomware operations evolved both in capabilities and the degree of organizational structure behind it. In this webinar, we'll cover the changes, what they mean and how cybersecurity strategies need to adapt to match this changing threat. But most importantly, have we learned from our past mistakes? |