A technical analysis of the BackMyData ransomware used to attack hospitals in Romania
|
|
0
|
1336
|
February 19, 2024
|
Android/SpyNote bypasses Restricted Settings + breaks many RE tools
|
|
0
|
1326
|
February 19, 2024
|
10 Steps to Building a Comprehensive CTI Practice
|
|
0
|
1237
|
February 19, 2024
|
Navigating 2024's Geopolitical Fault Lines
|
|
0
|
1468
|
February 17, 2024
|
Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign
|
|
0
|
1379
|
February 17, 2024
|
Taking Action With the Command Palette
|
|
0
|
1240
|
February 16, 2024
|
Introducing IDA 8.4: Key Features and Enhancements
|
|
0
|
1270
|
February 16, 2024
|
SNS Sender | Active Campaigns Unleash Messaging Spam Through the Cloud
|
|
0
|
1344
|
February 15, 2024
|
Advanced Cybercriminals Rapidly Diversify Cyberattack Channels Following Public Vulnerability Disclosure
|
|
0
|
1340
|
February 15, 2024
|
Unveiling Crypto Miner’s Stealthy Tactics: The Rise of Indirect Syscalls for Evasion
|
|
0
|
1332
|
February 15, 2024
|
2024-02-14 - Danabot infection from Italian malspam
|
|
0
|
1312
|
February 14, 2024
|
Igor’s Tip of the Week #175: IDB work directory
|
|
0
|
1313
|
February 14, 2024
|
Zloader Strikes Back
|
|
0
|
1358
|
February 14, 2024
|
The Next Evolution of Recorded Future AI: Powering the Future of Threat Intelligence
|
|
0
|
1381
|
February 14, 2024
|
Kimsuky Group’s Spear Phishing Detected by AhnLab EDR (AppleSeed, AlphaSeed)
|
|
0
|
1372
|
February 14, 2024
|
Plugin focus: Frinet
|
|
0
|
1456
|
February 13, 2024
|
Decrypted: Rhysida Ransomware
|
|
0
|
1440
|
February 13, 2024
|
Fileless Revenge RAT Malware
|
|
0
|
1520
|
February 13, 2024
|
Enhancing COM Reverse Engineering in Binary Ninja 4.0
|
|
0
|
1509
|
February 12, 2024
|
Black History Month - The Art of Intelligence: Portraits of Diversity, Learning, & Skill
|
|
0
|
1544
|
February 12, 2024
|
Overview: Evidence Collection of Ivanti Connected Secure Appliances
|
|
0
|
1542
|
February 12, 2024
|
DarkGate: Opening Gates for Financially Motivated Threat Actors
|
|
0
|
1374
|
February 12, 2024
|
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage
|
|
0
|
1386
|
February 12, 2024
|
A simple infostealer for beginners
|
|
0
|
1747
|
February 9, 2024
|
Sudo On Windows a Quick Rundown
|
|
0
|
1674
|
February 9, 2024
|
2024-02-08 - Pikabot infection
|
|
0
|
1625
|
February 9, 2024
|
The Phoenix Rises Again
|
|
0
|
1664
|
February 9, 2024
|
Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017–2023
|
|
0
|
1734
|
February 8, 2024
|
Android/Phoenix authors, claims, sample identification and trends
|
|
0
|
1566
|
February 8, 2024
|
BlueShell Used in Attacks Against Linux Systems in Korea (2)
|
|
0
|
1641
|
February 8, 2024
|