Notes on the underworld: emerging, enduring, and vanishing gangs, and their C2C markets. More...
Notes on the underworld: emerging, enduring, and vanishing gangs, and their C2C markets. More spearphishing of Ukrainian targets. US CYBERCOM releases IOCs obtained from Ukrainian networks.
A criminal talent broker...
Espionage and counterespionage during the hybrid war. Assessing Russian cyberops. Conti’s fate. Investigating cut...
Espionage and counterespionage during the hybrid war. Assessing Russian cyberops. Conti's fate. Investigating cut Internet cables in France. Trends in “pig-butchering.”
Traditional espionage and counterespionage during the hybrid war. Assessing...
Cyber phases of Russia’s hybrid war seem mostly espionage. Belgium accuses China of spying....
Cyber phases of Russia’s hybrid war seem mostly espionage. Belgium accuses China of spying. LockBit ransomware spreads. And Micodus GPS tracker vulnerabilities are real and unpatched.
What’s Russia up to...
Ukraine’s security chief and head prosecutor are out. Cyberattacks hit Albania. APTs prospect journalists....
Ukraine’s security chief and head prosecutor are out. Cyberattacks hit Albania. APTs prospect journalists. The GRU trolls researchers. CISA to open an attaché office in London.
Ukraine shakes up its...
Espionage and cyberespionage. Albania’s national IT networks work toward recovery. Malicious apps ejected from...
Espionage and cyberespionage. Albania's national IT networks work toward recovery. Malicious apps ejected from Google Play. White House summit addresses the cyber workforce. Notes on cybercrime.
A Cozy Bear sighting....
Ukraine evaluates Russia’s cyber ops. Smartphones go to war. Lilith ransomware. ChromeLoader evolves. Rolling-PWN...
Ukraine evaluates Russia’s cyber ops. Smartphones go to war. Lilith ransomware. ChromeLoader evolves. Rolling-PWN looks real after all. Schulte guilty in Vault 7 case.
An overview of the cyber phase...
Criminal gangs at war. A “cyber world war?” A new DPRK ransomware operation. Media...
Criminal gangs at war. A "cyber world war?" A new DPRK ransomware operation. Media organizations targeted by state actors. NSA guidance on characterizing threats and risks to microelectronics.
Gangland goes...
AiTM sets up BEC. Silent validation bots. Smishing attempt at the European Central Bank....
AiTM sets up BEC. Silent validation bots. Smishing attempt at the European Central Bank. Shields up in Berlin. Hacktivism in a hybrid war. Patch notes.
Adversary-in-the-middle sites support business email...
High-end and low-end extortion. Push to start–wait, not you… Social media and open-source...
High-end and low-end extortion. Push to start–wait, not you… Social media and open-source intelligence. Russian cyberattacks spread internationally. Preparing for cyber combat.
High-end and low-end extortion. Vehicles from Honda...
DDoS attacks strike countries friendly to Ukraine. Predatory Sparrow’s assault on Iran’s steel industry....
DDoS attacks strike countries friendly to Ukraine. Predatory Sparrow's assault on Iran's steel industry. Callback phishing impersonates security companies. Anubis is back. BlackCat ups the ante.
More deniable DDoS attacks...