Explore >> Select a destination


You are here

securityinaction.wordpress.com
| | thehackernews.com
1.5 parsecs away

Travel
| | EDRKillShifter, a new tool linked to RansomHub ransomware, targets EDR software, posing a growing threat to endpoint security.
| | blog.eclecticiq.com
3.4 parsecs away

Travel
| | The latest Analyst Prompt looks at FIN7 delivering Clop ransomware, a BatLoader campaign that leverages ChatGPT and Midjourney imposter apps, and more.
| | redteaming.co.uk
4.4 parsecs away

Travel
| | DLL Side-Loading or DLL Proxy loading allows an attacker to abuse a legitimate and typically signed executable for code-execution on a compromised system. Mitre has been keeping a log of this technique since 2017, and it continues to be a popular option by threat actors (For good reasons!) Proxy loading is very similar to DLL...
| | blog.trailofbits.com
55.6 parsecs away

Travel
| Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.