Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
CloudSorcerer APT uses cloud services and GitHub as C2 | Securelist
XZ backdoor behavior inside OpenSSH
Leaked LockBit builder in a real-life incident response case | Securelist
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
Operation Triangulation: The last (hardware) mystery
StripedFly: Perennially flying under the radar
Dissecting TriangleDB, a Triangulation spyware implant
DNS changer in malicious mobile app used by Roaming Mantis
Stolen certificates in two waves of ransomware and wiper attacks
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company
Malicious Tor Browser spreads through YouTube
Kimsuky’s GoldDragon cluster and its C2 operations | Securelist
Kaspersky report on Luna and Black Basta ransomware
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs