Newsletter Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs "Who knew your Windows Event Log was the snitch you always needed but never spoke to—until now."
Newsletter Why Adversaries Target VPN Appliances: The Pathway from IT to OT Cyber Attack Hackers making a "VPN sandwich": IT bun, OT filling. Deliciously destructive.
Newsletter Why Adversaries Target VPN Appliances: The Pathway from IT to OT Cyber Attack Hackers making a "VPN sandwich": IT bun, OT filling. Deliciously destructive.
Newsletter BBTok's Bizarre Brazilian Banking Blitz: Deobfuscation Demystified Just when you thought your bank statements were safe, along comes BBTok with a .NET loader and a penchant for secret codes.
Newsletter BBTok's Bizarre Brazilian Banking Blitz: Deobfuscation Demystified Just when you thought your bank statements were safe, along comes BBTok with a .NET loader and a penchant for secret codes.
Newsletter Vesta Admin Panel Vulnerability Allows Complete Linux Server Takeover "Because what’s worse than managing a server? Losing control of it entirely."
Vulnerability Management Vesta Admin Panel Vulnerability Allows Complete Linux Server Takeover "Because what’s worse than managing a server? Losing control of it entirely."
Newsletter Cyberwarfare, Espionage & Extortion Issue #17: 10th May 2024 "Hell is empty, and all the devils are here" - The Tempest
Newsletter Cyberwarfare, Espionage & Extortion Issue #17: 10th May 2024 "Hell is empty, and all the devils are here" - The Tempest
Newsletter Cyberwarfare, Espionage & Extortion Issue #16: 3rd May 2024 "You won't know who to trust" -- Gregor, Sneakers
Newsletter Cyberwarfare, Espionage & Extortion Issue #16: 3rd May 2024 "You won't know who to trust" -- Gregor, Sneakers
Newsletter Cyberwarfare, Espionage & Extortion Issue #15: Friday 26th April 2024 "If you want a picture of the future, imagine a boot stamping on a human face—forever. " - George Orwell, 1984