Category: featured

Providing Solutions

Telerik UI exploitation leads to cryptominer, Cobalt Strike infections

Attacker targets bugs in a popular web application graphical interface development tool

The Active Adversary Playbook 2022

Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021

Malicious Word doc taps previously unknown Microsoft Office vulnerability

MSDT.exe misuse in May makes for Memorial Day Monday mayhem

Liquidity mining scams add another layer to cryptocurrency crime

Organized rings use fake apps, malicious smart contracts, and lure of big returns to swindle victims out of their savings.