Click here to download all references as Bib-File.
2022-11-25 ⋅ Resecurity ⋅ "In The Box" - Mobile Malware Webinjects Marketplace Alien Cerberus Coper ERMAC Hydra |
2022-09-05 ⋅ Resecurity ⋅ EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web |
2022-08-25 ⋅ Resecurity ⋅ COVID-19 Data Put For Sale In Dark Web |
2022-08-21 ⋅ Resecurity ⋅ Escanor Malware Delivered In Weaponized Microsoft Office Documents |
2022-08-19 ⋅ Resecurity ⋅ Cybercriminals Are Targeting Law Enforcement Agencies Worldwide |
2022-08-07 ⋅ Resecurity ⋅ Vulnerabilities In E-Commerce Solutions - Hunting On Big Apples |
2022-08-07 ⋅ Resecurity ⋅ LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities |
2022-07-17 ⋅ Resecurity ⋅ Shortcut-Based (LNK) Attacks Delivering Malicious Code On The Rise AsyncRAT BumbleBee Emotet IcedID QakBot |
2021-07-07 ⋅ Twitter (@resecurity_com) ⋅ Tweet REvil attack chain used against Kaseya REvil |
2019-03-11 ⋅ Packt ⋅ Resecurity reports ‘IRIDUIM’ behind Citrix data breach, 200+ government agencies, oil and gas companies, and technology companies also targeted. IRIDIUM |