Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
APT (Targeted attacks)
APT (Targeted attacks)
securelist.com
ToddyCat is making holes in your infrastructure – Source: securelist.com
securelist.com
Assessing the Y, and How, of the XZ Utils incident – Source: securelist.com
securelist.com
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware – Source: securelist.com
securelist.com
Using the LockBit builder to generate targeted ransomware – Source: securelist.com
securelist.com
ICS and OT threat predictions for 2024 – Source: securelist.com
securelist.com
A lightweight method to detect potential iOS malware – Source: securelist.com
securelist.com
Operation Triangulation: The last (hardware) mystery – Source: securelist.com
securelist.com
IT threat evolution in Q2 2023 – Source: securelist.com
securelist.com
Focus on DroxiDat/SystemBC – Source: securelist.com
securelist.com
APT trends report Q2 2023 – Source: securelist.com
securelist.com
Dissecting TriangleDB, a Triangulation spyware implant – Source: securelist.com
securelist.com
IT threat evolution Q1 2023 – Source: securelist.com
securelist.com
In search of the Triangulation: triangle_check utility – Source: securelist.com
securelist.com
Meet the GoldenJackal APT group. Don’t expect any howls – Source: securelist.com
securelist.com
CloudWizard APT: the bad magic story goes on – Source: securelist.com
securelist.com
APT trends report Q1 2023 – Source: securelist.com
securelist.com
Tomiris called, they want their Turla malware back – Source: securelist.com
securelist.com
Following the Lazarus group by tracking DeathNote campaign – Source: securelist.com
Latest Cyber News
The Hacker News
U.S. Government Releases New AI Security Guidelines for Critical Infrastructure – Source:thehackernews.com
30/04/2024
The Hacker News
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers – Source:thehackernews.com
30/04/2024
The Hacker News
Apache Cordova App Harness Targeted in Dependency Confusion Attack – Source:thehackernews.com
30/04/2024
The Hacker News
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques – Source:thehackernews.com
30/04/2024
The Hacker News
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases – Source:thehackernews.com
30/04/2024
The Hacker News
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery – Source:thehackernews.com
30/04/2024
The Hacker News
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies – Source:thehackernews.com
30/04/2024
The Hacker News
U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse – Source:thehackernews.com
30/04/2024
The Hacker News
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware – Source:thehackernews.com
30/04/2024