Raccoon Stealer’s Abuse of Google Cloud Services and Multiple Delivery Techniques
With additional insights/analysis from Augusto Remillano II and Don Ovid Ladores Raccoon emerged as Malware as a Service (MaaS) last...
With additional insights/analysis from Augusto Remillano II and Don Ovid Ladores Raccoon emerged as Malware as a Service (MaaS) last...
As more and more countries order their citizens inside in response to COVID-19, online shopping—already a widespread practice—has surged in...
According to the report by Rostelecom Solar JSOC, hackers changed the focus of attacks, switching from direct theft of money...
A surge in new cyberspying by a speculated Chinese group that dates as far back as to late January was...
The first step anyone took after hearing the first of the Coronavirus was ‘Googling’ it. Google has been a solution,...
Owing to the lockdown due to the outbreak of the global pandemic Covid-19, people are once again resorting to their...
On December 4, 2019, we discovered watering hole websites that were compromised to selectively trigger a drive-by download attack with...
auspex noun: An augur of ancient Rome, especially one who interpreted omens derived from the observation of birds.awspx is a...
Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization...
In a recent episode of Rapid7’s podcast, Security Nation, we talked with Jonathan Cran, Head of Research at Kenna Security....