/f/research

How to tell if a website is safe _welivesecurity.com
| posted in rouiejay12 No comments |
1

How Cyber Sleuths Cracked an ATM Shimmer Gang _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Why is it so very interesting to arrest a cybercriminal? _cybernews.com
| posted in rouiejay12 No comments |
1

A deep dive into the operations of the LockBit ransomware group _zdnet.com
| posted in rouiejay12 No comments |
1

Changes In The Ransomware Landscape _blog.avast.com
| posted in rouiejay12 No comments |
1

Process Ghosting: The Latest Malware Evasion Technique _sensorstechforum.com
| posted in rouiejay12 No comments |
1

The State of Ransomware in Government 2021 _news.sophos.com
| posted in rouiejay12 No comments |
1

Malware hosting domain Cyberium fanning out Mirai variants _cybersecurity.att.com
| posted in rouiejay12 No comments |
1

Online map visualizes the widespread presence of automated ransomware _scmagazine.com
| posted in rouiejay12 No comments |
1

Data teams are discovering the benefits of automation and flexible coding _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Ransomware will cost its victims more around $265 billion (USD) annually by 2031, Cybersecurity Ventures predicts _itsecurityguru.org
| posted in rouiejay12 No comments |
1

CISOs Say Application Security is Broken _securityboulevard.com
| posted in rouiejay12 No comments |
1

Google reins in the madness and brings some sanity to Chrome's address bar _betanews.com
| posted in rouiejay12 No comments |
1

Trickbot Investigation Shows Details of Massive Cybercrime Effort _darkreading.com
| posted in rouiejay12 No comments |
1

Burgeoning ransomware gang Avaddon appears to shut down, mysteriously _cyberscoop.com
| posted in rouiejay12 No comments |
1

Are fraudsters using automation to execute mass cyber-attacks? _cybersecurity.att.com
| posted in rouiejay12 No comments |
1

What 5G Will Actually Do for the U.S. Military _defenseone.com
| posted in rouiejay12 No comments |
1

Stealthy Gelsemium cyberspies linked to NoxPlayer supply-chain attack _bleepingcomputer.com
| posted in rouiejay12 No comments |
1

Most mobile finance apps vulnerable to data breaches _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Hacking space: How to pwn a satellite _welivesecurity.com
| posted in rouiejay12 No comments |
1

A deep dive into Nefilim, a ransomware group with an eye for $1bn+ revenue companies _zdnet.com
| posted in rouiejay12 No comments |
1

Researchers Discover Novel Class of Vehicle Cyberattacks _homelandsecuritynewswire.com
| posted in rouiejay12 No comments |
1

How a malicious bot tries to evade detection by morphing _techrepublic.com
| posted in rouiejay12 No comments |
1

100 Point Cybersecurity Checklist _seirim.com
| posted in shirelywang No comments |
1

Necro Python bot revamped with new VMWare, server exploits _zdnet.com
| posted in rouiejay12 No comments |
1

Microservices, containers, and Kubernetes have created security blind spots _betanews.com
| posted in rouiejay12 No comments |
1

Evolution and anatomy of ransomware attacks _cybertalk.org
| posted in rouiejay12 No comments |
1

Researchers Demonstrate 2 New Hacks to Modify Certified PDF Documents _thehackernews.com
| posted in rouiejay12 No comments |
1

NASA has detected 1.785 cyber security incidents in 2020! _en.secnews.gr
| posted in rouiejay12 No comments |
1

Using Fake Reviews to Find Dangerous Extensions _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Microsoft details sophisticated spear-phishing attacks from NOBELIUM _securityaffairs.co
| posted in rouiejay12 No comments |
1

Researchers find four new malware tools created to exploit Pulse Secure VPN appliances _zdnet.com
| posted in rouiejay12 No comments |
1

Dissecting the Colonial Pipeline Incident _technewsworld.com
| posted in rouiejay12 No comments |
1

What to expect when you've been hit with Avaddon ransomware _news.sophos.com
| posted in rouiejay12 No comments |
1

Research Exposes 10 Common Threats Vexing Cloud Customers _technewsworld.com
| posted in rouiejay12 No comments |
1

Majority of Microsoft Exchange Server exposures occurred in the cloud _scmagazine.com
| posted in rouiejay12 No comments |
1

New Report Profiles Ransomware Cybergangs _technewsworld.com
| posted in rouiejay12 No comments |
1

Probe Into Florida Water Plant Hack Led to Discovery of Watering Hole Attack _securityweek.com
| posted in rouiejay12 No comments |
1

Detecting The Infamous LokiBot Malware Virus _cybrary.it
| posted in rouiejay12 No comments |
1

This is how the Cobalt Strike penetration testing tool is being abused by cybercriminals _zdnet.com
| posted in rouiejay12 No comments |
1