Zero-clicks for Apple
Recently a security researcher discovered that they could achieve remote code execution (RCE) on targeted Apple systems. In the research,…
Recently a security researcher discovered that they could achieve remote code execution (RCE) on targeted Apple systems. In the research,…
Microsoft Graph API and data theft Nation-state actors such as APT37 (NK) are using native Microsoft tools to host C2…
Fancy Bear, an advanced persistent threat (APT28) group linked to the Russian Intelligence Directorate, has been abusing Windows Print Spooler…
Lets have a quick talk about channels for data exfiltration. Recently I was doing some security testing in a client’s…
Today marks the inception of a new segment in my musings – welcome to “Threat Actor Thursday.” Join me each…