What Are LOLBins?
LOLBins, also known as “Living off the Land Binaries,” are binaries that use legitimate commands and pre-installed executables of the…
LOLBins, also known as “Living off the Land Binaries,” are binaries that use legitimate commands and pre-installed executables of the…
Since russia’s full-fledged invasion of Ukraine, the aggressor’s offensive forces have launched thousands of targeted cyber attacks against Ukraine. One…
Threat detection engineering (DE) is more complex than it might seem initially. It goes far beyond the detection of events…
Heads up! Cyber defenders are notified of a new wave of phishing attacks leveraging the invoice-relate email subjects with the…
Cybersecurity researchers have unveiled a new offensive operation launched by the russia-backed Storm-0978 aka DEV-0978 group, which is also tracked…
Cybersecurity researchers have uncovered traces of new malicious activity attributed to the nefarious BlackCat aka ALPHV ransomware gang. The adversary…
Cybersecurity researchers issue a heads-up covering a new targeted cyber attack by the UAC-0057 group against Ukrainian public officials leveraging…
CERT-UA researchers recently uncovered a fraudulent copy of the English-language version of the Ukrainian World Congress website at https://www.ukrainianworldcongress.org/. The…
Quantum ransomware, a strain that has garnered significant attention since its discovery in July 2021, has proven to be an…
Cybersecurity awards play a much more profound role than simply giving out yearly titles to companies and products. They support…