Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year
A few hours ago on Breach Forum, a threat actor by the name “newplzqibeme” shared a GitHub repository where a python-written exploit for active exploitation
RHC DarkLab has always taken a unique and provocative approach in the fight against cyber threats, summed up by the motto: ‘One must know the
The Stormous group represents a significant threat in the ransomware landscape: it has an established reputation for its targeted attacks and its overtly pro-Russian ideology.
I became aware of this technique like 9 months ago, and now I see this on a attack in the wild conducted by Qilin Ransomware
This is a continuation of the Conti story. You can read the previous part, which covered the group’s origins, in the previous article. We will
Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims that Tesla’s charging station database
Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company’s employees. The leak, dated October 2024,
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat
A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed