LABScon Replay | Are Digital Technologies Eroding the Principle of Distinction in War?
In recent conflicts, digital technology has become weaponized, eroding the traditional barriers that divide the roles of civilians and combatants.
Read More
In recent conflicts, digital technology has become weaponized, eroding the traditional barriers that divide the roles of civilians and combatants.
SocGholish operators continue to infect websites at a massive scale, and the threat actor is ramping up its infrastructure to match.
Black Basta operational TTPs are described here in full detail, revealing previously unknown tools and techniques and a link to FIN7.
Precision targeting of critical infrastructure industries indicates espionage-related activity by an unattributed Chinese-speaking threat group.
The Void Balaur cyber mercenary group has thrived throughout 2022, attacking targets on a global scale with new phishing campaigns.
An elusive adversary is attacking high-value targets with impunity using novel malware frameworks and custom-built backdoors.
Partially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.
A new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.
Crimeware vendors say 'macros are dead', but they have a new weapon to help threat actors successfully deploy malware.
The self-proclaimed 'oldest ransomware affiliate on the planet' has new tricks and new features and continues to beat enterprise defenses.