Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Exfiltrator-22: The Newest Post-Exploitation Toolkit Nipping at Cobalt Strike’s Heels

Posted on February 28, 2023
The framework-as-a-service signals an intensification of the cat-and-mouse game between defenders detecting lateral movement, and cybercriminals looking to go unnoticed.
Posted in News

Post navigation

Previous: The iPhone 15’s USB-C Port Might Need Special Cables For Full Functionality
Next: LastPass DevOps Engineer Targeted for Cloud Decryption Keys in Latest Breach Revelation

Recent Posts

  • Maybe a Han Solo Movie Wasn’t a Great Idea, Admits Kathleen Kennedy
  • How to fireproof a city
  • Why Don’t You Use a Mobile Security App? We Ask Netizens
  • Your Digital Footprint Can Lead Right to Your Front Door
  • Your Digital Footprint Can Lead Right to Your Front Door

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized

Related Posts

The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think

  • News

According to research from GitGuardian and CyberArk, 79% of IT…

  • rooter
  • November 18, 2024
  • 1 min read
  • 0

Black Basta Pivots to Cactus Ransomware Group

  • News

The future of the formerly fearsome cybercriminal group remains uncertain…

  • rooter
  • March 5, 2025
  • 1 min read
  • 0

Clop ransomware gang exploits the MOVEit Transfer vulnerability to steal data

  • News

More information is coming to light after news last week…

  • rooter
  • June 5, 2023
  • 1 min read
  • 0

FESTO Automation Suite, FluidDraw, and Festo Didactic Products

  • News

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable…

  • rooter
  • July 1, 2025
  • 4 min read
  • 0
Copyright © 2026 Technology Security Information Theme: Translucent Blog By Adore Themes.