Generative Data Intelligence

Tag: obfuscation

Raspberry Robin Worm Targets Telcos & Governments

It's likely the group behind the worm called Raspberry Robin is just testing the waters — launching attacks against telecommunications companies and governments across...

Data Destruction Policies in the Age of Cloud Computing

These days, most big companies and many midsize ones have some form of a data-governance program, typically including policies for data retention and destruction....

The Digital Asset Anti-Money Laundering Act: An Unconstitutional Bill For An Unconstitutional World

This is an opinion editorial by L0la L33tz, a privacy and security researcher and hacking advocate.Yesterday, the U.S. Senate proposed the Digital Asset Anti-Money...

Analysis Shows Attackers Favor PowerShell, File Obfuscation

An analysis of threats encountered by four organizations has identified the most common techniques used by attackers to compromise systems, infiltrate networks, and steal...

Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities

ESET researchers discovered a spearphishing campaign targeting Japanese political entities a few weeks before the House of Councillors elections, and in the process...

Castles Made of Sand Dollars: SBF, FTX, and other Three Letter Agents

The story of Bitcoin has certainly had its fair share of nefarious characters, criminal activity, bad haircuts and worse wardrobes, and yet our anti-hero...

Zerobot Weaponizes Numerous Flaws in Slew of IoT Devices

A new botnet is attacking organizations through various vulnerabilities in Internet of Things (IoT) devices from D-Link, Huawei, RealTek, TOTOLink, Zyxel, and more, posing...

Op-Ed: How the crypto industry is responding to the FTX collapse

Millions of cryptocurrency traders who previously used FTX are left wondering if they’ll ever receive their funds after the exchange collapsed...

OSCE Trains Uzbekistan Law Enforcement to Track and Seize Crypto, Search Dark Web

OSCE Trains Uzbekistan Law Enforcement to Track and Seize Crypto, Search Dark WebThe Organization for Security and Co-operation in Europe (OSCE) has set out to teach law enforcement officers in Uzbekistan how to conduct crypto and dark web investigations. The regional body recently organized a training course for employees of the country’s security agencies in Tashkent. Uzbekistan Police and Security Agents Attend OSCE Course on Cryptocurrencies Representatives […]

Domestic Kitten campaign spying on Iranian citizens with new FurBall malware

APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app ...

Enterprise Blockchains Redux: How to be not-not NIST compliant without breaking the bank

Opinion from Dr. Andreas Freund, EEA Mainnet Interest Group Member Blockchains have a seldom talked about problem which is independent of the ups and downs...

WONSYS Anatomy Of A Ransomware Attack | WONSYS Ransomware

Reading Time: 4 minutesMost people are aware of ransomware by now, certainly those who regularly read the Comodo blog section and similar...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?