Tag: Techniques
-
Top 5 Scam Techniques: What You Need to Know
Scammers are increasingly resourceful when coming up with scam techniques. But they often rely on long-standing persuasion techniques for …
-
Sophos Anticipates AI-Based Attack Techniques and Prepares Detections
Sophos, a global leader in innovating and delivering cybersecurity as a service, released two reports about the use of AI in cybercrime. …
-
Signature Techniques of Asian APT Groups Revealed
The Kaspersky Cyber Threat Intelligence team has unveiled crucial insights into the tactics, techniques and procedures (TTPs) employed by …
-
QuasarRAT Deploys Advanced DLL Side-Loading Technique
A recent research report by Uptycs has highlighted the evolution of QuasarRAT, an open-source remote administration tool (RAT) known for …
-
‘Etherhiding’ Blockchain Technique Masks Malicious Code in WordPress Sites
The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma …
-
‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites
The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma …
-
‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites
The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma …
-
Understanding Cybersecurity Footprinting: Techniques and Strategies
Footprinting, also known as fingerprinting, is a methodology used by penetration testers, cybersecurity professionals, and even threat …
-
North Korean Hackers Continue to Refine Their Arsenal of Tactics & Techniques
The Democratic People’s Republic of Korea continues to advance its offensive cyber program, showcasing its unwavering commitment to using …
-
A Frontline Report of Chinese Threat Actor Tactics and Techniques
Threat intel experts see a reduced focus on desktop malware as threat groups prioritize passwords and tokens that let them access the same …
-
Old-School Attacks Are Still a Danger, Despite Newer Techniques
For all the conversations about new technologies like ChatGPT and the increasing sophistication of attacks, plenty of cybercriminals are …
-
New Attack Technique “MalDoc in PDF” Alarms Experts
Security experts from JPCERT/CC have identified a new attack technique called “MalDoc in PDF,” which can elude detection by embedding a …
●●●