Tag: Techniques
-
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting …
-
Top 5 Scam Techniques: What You Need to Know
Scammers are increasingly resourceful when coming up with scam techniques. But they often rely on long-standing persuasion techniques for …
-
Sophos Anticipates AI-Based Attack Techniques and Prepares Detections
Sophos, a global leader in innovating and delivering cybersecurity as a service, released two reports about the use of AI in cybercrime. …
-
Signature Techniques of Asian APT Groups Revealed
The Kaspersky Cyber Threat Intelligence team has unveiled crucial insights into the tactics, techniques and procedures (TTPs) employed by …
-
QuasarRAT Deploys Advanced DLL Side-Loading Technique
A recent research report by Uptycs has highlighted the evolution of QuasarRAT, an open-source remote administration tool (RAT) known for …
-
‘Etherhiding’ Blockchain Technique Masks Malicious Code in WordPress Sites
The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma …
-
‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites
The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma …
-
‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites
The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma …
-
Understanding Cybersecurity Footprinting: Techniques and Strategies
Footprinting, also known as fingerprinting, is a methodology used by penetration testers, cybersecurity professionals, and even threat …
-
North Korean Hackers Continue to Refine Their Arsenal of Tactics & Techniques
The Democratic People’s Republic of Korea continues to advance its offensive cyber program, showcasing its unwavering commitment to using …
-
A Frontline Report of Chinese Threat Actor Tactics and Techniques
Threat intel experts see a reduced focus on desktop malware as threat groups prioritize passwords and tokens that let them access the same …
-
Old-School Attacks Are Still a Danger, Despite Newer Techniques
For all the conversations about new technologies like ChatGPT and the increasing sophistication of attacks, plenty of cybercriminals are …
●●●