|
You are here |
www.nextron-systems.com | ||
| | | | |
www.huntandhackett.com
|
|
| | | | | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post. | |
| | | | |
intezer.com
|
|
| | | | | A sophisticated phishing campaign, with emails written in Hebrew, deploys a new wiper malware affecting Windows and Linux servers. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | By Flavio Costa, * In a recent customer engagement, we observed a month-long AvosLocker campaign. * The attackers utilized several different tools, including Cobalt Strike, Sliver and multiple commercial network scanners. * The initial ingress point in this incident was a pair of VMWare Horizon Unified Access Gateways that were vulnerable to Log4Shell. | |
| | | | |
tcode2k16.github.io
|
|
| | | a random blog about cybersecurity and programming | ||