|
You are here |
o365blog.com | ||
| | | | |
www.welivesecurity.com
|
|
| | | | | ESET researchers uncover an active malicious campaign in Latin America that uses new versions of old malware, Bandook, to spy on its victims. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
aadinternals.com
|
|
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | |
blog.securityinnovation.com
|
|
| | | Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them. | ||