|
You are here |
blogs.blackberry.com | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | Sodinokibi is a Ransomware-as-a-Service provider that has been covered in the news quite a bit recently. This article takes a deep-dive analysis into the inner workings of how the ransomware operates. It will focus on technical details such as how encryption keys are generated and how files are encrypted. | |
| | | | |
www.huntandhackett.com
|
|
| | | | | Explore how the Sliver framework is used by threat actors for covert control and information gathering. Learn about detection methods and hunting tactics in this insightful post. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
www.techradar.com
|
|
| | | Changes are coming | ||