
UNC5221: Unreported and Undetected WIREFIRE Web Shell Variant
Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti
Eine neue Betrugsmasche hat es erfolgreich auf Unternehmen abgesehen, die ihre Angaben im Handelsregister kürzlich aktualisiert haben. Obwohl diese Rechnungen
A new scam is successfully targeting companies which have recently made updates to their information in the Handelsregister. Although convincing,
The new law-based rules for “civilian hackers” during war and the obligations of states to restrain them.
This report provides insight into the enforcement trends of the EU’s General Data Protection Regulation (GDPR) over five years.
ECSO-backed Women4Cyber Mentorship programme is designed to help women improve their skills and advance their cybersecurity careers at all levels.
QuoIntelligence analyzed an information operation campaign aiming to discourage Russian speaking citizens from voting in the latest Spanish elections.
Analysis and evaluation of the DORA regulation, which establishes a single European regulatory framework for the management of risks derived
Analysis of the Hamas-Israel crisis and the main cyber and geopolitical takeaways for European oil and gas companies
What we liked, lacked and learned from our second company workshop to bond, learn new skills, and recharge our batteries.
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament