Credential and cryptocurrency theft, live surveillance, ransomware - an attacker's Swiss Army knife A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks ...
AttackIQ has released a new attack graph that emulates the behaviors exhibited by BlackByte ransomware, a strain operated ...
New capability indexes ransomware leak-site file trees into Cerberus platform, accelerating incident response even when ...
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in exploits, defenders might have hoped use of this tactic would decline. They were ...
New capability indexes ransomware leak-site file trees into Cerberus platform, accelerating incident response even when organizations aren’t the primary victim. This feature allows analysts to quickly ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results