Resecurity
C2 Frameworks - Threat Hunting in Action with YARA Rules
8 months 1 week ago
Terrorist Activity is Accelerating in Cyberspace - Risk Precursor to Summer Olympics and Elections
8 months 2 weeks ago
CVE-2024-4879 and CVE-2024-5217 (ServiceNow RCE) Exploitation in a Global Reconnaissance Campaign
8 months 2 weeks ago
Smishing Triad Is Targeting India To Steal Personal and Payment Data at Scale
9 months ago
Cybercriminals Are Targeting Digital Identity of Singapore Citizens
9 months 2 weeks ago
Smishing Triad Is Targeting Pakistan To Defraud Banking Customers At Scale
10 months ago
Organized North Korean Remote IT Worker Fraud Compels Organizations to Enhance Hiring Verification Controls With Next-Gen CTI
10 months ago
Cybercriminals attack banking customers in EU with V3B phishing kit
10 months 1 week ago
Navigating the Hajj Season: A Time of Spiritual Unity and Rising Cyber Threats Targeting Consumers
10 months 2 weeks ago
Cybercriminals are Targeting Elections in India with Influence Campaigns
10 months 3 weeks ago
Massive Dump of Hacked Salvadorean Headshots and PII Highlights Growing Threat-Actor Interest in Biometric Data
11 months ago
Misinformation and Hacktivist Campaigns Target the Philippines Amidst Rising Tensions with China
11 months 3 weeks ago
The New Version of JsOutProx is Attacking Financial Institutions in APAC and MENA via GitLab Abuse
1 year ago
Cybercriminals Transform Raspberry Pi into a Tool for Fraud and Anonymization: GEOBOX Discovery
1 year ago
Cybercriminals Accelerate Online Scams During Ramadan and Eid Fitr
1 year ago
The Aviation and Aerospace Sectors Face Skyrocketing Cyber Threats
1 year ago
Cybercriminals Evolve Tooling for Remote Access Compromise
1 year ago
Active Dark Web Intelligence To Aid Mergers and Acquisitions (M&A)
1 year 1 month ago
LockBit 3.0’s Bungled Comeback Highlights the Undying Risk of Torrent-Based Data Leakage
1 year 1 month ago
Checked
11 hours 12 minutes ago
Blog
Resecurity feed