PhishingSecurity A new RevengeHotels campaign targets Latin America by admin October 7, 2025 by admin October 7, 2025 Background RevengeHotels, also known as TA558, is a threat group that has been active… 0 FacebookTwitterPinterestEmail
PhishingSecurity Can we counter online disinformation? by admin October 7, 2025 by admin October 7, 2025 Ever wondered why a lie can spread faster than the truth? Tune in for… 0 FacebookTwitterPinterestEmail
PhishingSecurity Kaspersky industrial threat report for Q2 2025 by admin October 7, 2025 by admin October 7, 2025 Statistics across all threats In Q2 2025, the percentage of ICS computers on which… 0 FacebookTwitterPinterestEmail
PhishingSecurity Malware sharing, data wiping and exploits by admin October 7, 2025 by admin October 7, 2025 ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid… 0 FacebookTwitterPinterestEmail
PhishingSecurity AmCache artifact: forensic value and a tool for data extraction by admin October 7, 2025 by admin October 7, 2025 Introduction When it comes to digital forensics, AmCache plays a vital role in identifying… 0 FacebookTwitterPinterestEmail
PhishingSecurity Is your phone spying on you? by admin October 6, 2025 by admin October 6, 2025 Here’s what you need to know about the inner workings of modern spyware and… 0 FacebookTwitterPinterestEmail
PhishingSecurity How a machine-learning model in Kaspersky SIEM detected DLL-hijacking incidents by admin October 6, 2025 by admin October 6, 2025 Introduction Our colleagues from the AI expertise center recently developed a machine-learning model that… 0 FacebookTwitterPinterestEmail
PhishingSecurity Gamaredon X Turla collab by admin October 6, 2025 by admin October 6, 2025 In this blogpost, we uncover the first known cases of collaboration between Gamaredon and… 0 FacebookTwitterPinterestEmail
PhishingSecurity Social engineering aspect of the XZ incident by admin April 27, 2024 by admin April 27, 2024 High-end APT groups perform highly interesting social engineering campaigns in order to penetrate well-protected… 0 FacebookTwitterPinterestEmail