From the Front Lines | Unsigned macOS oRAT Malware Gambles For The Win From the Front Lines | 6 minute read Read More >
Enterprise Security Essentials | Top 15 Most Routinely Exploited Vulnerabilities 2022 From the Front Lines | 10 minute read Read More >
From the Front Lines | Peering into A PYSA Ransomware Attack From the Front Lines | 14 minute read Read More >
From the Front Lines | Hive Ransomware Deploys Novel IPfuscation Technique To Avoid Detection From the Front Lines | 12 minute read Read More >
Threat Actor UAC-0056 Targeting Ukraine with Fake Translation Software From the Front Lines | 3 minute read Read More >
Cyber War Elements In The Ukrainian Conflict | Hosted by the Alperovitch Institute for Cybersecurity Studies From the Front Lines | 81 minute read Read More >
Log4j One Month On | Crimeware and Exploitation Roundup From the Front Lines | 7 minute read Read More >
In-the-Wild WPAD Attack | How Threat Actors Abused Flawed Protocol For Years From the Front Lines | 8 minute read Read More >
Is SquirrelWaffle the New Emotet? How to Detect the Latest MalSpam Loader From the Front Lines | 6 minute read Read More >