Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Targeted attacks
Targeted attacks
securelist.com
Managed Detection and Response in 2023 – Source: securelist.com
securelist.com
ToddyCat is making holes in your infrastructure – Source: securelist.com
securelist.com
Assessing the Y, and How, of the XZ Utils incident – Source: securelist.com
securelist.com
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware – Source: securelist.com
securelist.com
Using the LockBit builder to generate targeted ransomware – Source: securelist.com
securelist.com
ICS and OT threat predictions for 2024 – Source: securelist.com
securelist.com
A lightweight method to detect potential iOS malware – Source: securelist.com
securelist.com
Operation Triangulation: The last (hardware) mystery – Source: securelist.com
securelist.com
IT threat evolution in Q2 2023 – Source: securelist.com
securelist.com
Focus on DroxiDat/SystemBC – Source: securelist.com
securelist.com
Common TTPs of attacks against industrial organizations – Source: securelist.com
securelist.com
APT trends report Q2 2023 – Source: securelist.com
Security Boulevard
Employee Spotlight – Joseph Pike – Source: securityboulevard.com
securelist.com
Dissecting TriangleDB, a Triangulation spyware implant – Source: securelist.com
securelist.com
Operation Triangulation: iOS devices targeted with previously unknown malware – Source: securelist.com
securelist.com
Meet the GoldenJackal APT group. Don’t expect any howls – Source: securelist.com
securelist.com
CloudWizard APT: the bad magic story goes on – Source: securelist.com
securelist.com
The nature of cyberincidents in 2022 – Source: securelist.com
securelist.com
Managed Detection and Response in 2022 – Source: securelist.com
securelist.com
APT trends report Q1 2023 – Source: securelist.com
securelist.com
Tomiris called, they want their Turla malware back – Source: securelist.com
securelist.com
Following the Lazarus group by tracking DeathNote campaign – Source: securelist.com
Latest Cyber News
The Register Security
Indian bank’s IT is so shabby it’s been banned from opening new accounts – Source:...
01/05/2024
The Register Security
Australia’s spies and cops want ‘accountable encryption’ – aka access to backdoors – Source: go.theregister.com
01/05/2024
The Register Security
Governments issue alerts after ‘sophisticated’ state-backed actor found exploiting flaws in Cisco security boxes –...
01/05/2024
The Register Security
Shouldn’t Teams, Zoom, Slack all interoperate securely for the Feds? Wyden is asking – Source:...
01/05/2024
The Hacker News
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds – Source:thehackernews.com
01/05/2024
The Hacker News
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers – Source:thehackernews.com
01/05/2024
The Hacker News
Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success – Source:thehackernews.com
01/05/2024
The Hacker News
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan – Source:thehackernews.com
01/05/2024
The Hacker News
Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia – Source:thehackernews.com
01/05/2024