Explore >> Select a destination


You are here

www.nextron-systems.com
| | www.huntandhackett.com
4.3 parsecs away

Travel
| | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post.
| | intezer.com
4.0 parsecs away

Travel
| | A sophisticated phishing campaign, with emails written in Hebrew, deploys a new wiper malware affecting Windows and Linux servers.
| | blog.talosintelligence.com
3.7 parsecs away

Travel
| | By Flavio Costa, * In a recent customer engagement, we observed a month-long AvosLocker campaign. * The attackers utilized several different tools, including Cobalt Strike, Sliver and multiple commercial network scanners. * The initial ingress point in this incident was a pair of VMWare Horizon Unified Access Gateways that were vulnerable to Log4Shell.
| | tcode2k16.github.io
13.9 parsecs away

Travel
| a random blog about cybersecurity and programming