YUCAUnmasking Wave Stealer: A Dive into Wave Stealer Malware Analysis and Its Ultimate ShutdownUnmasking Wave Stealer: A Deep Dive into Malware Analysis and Its Ultimate ShutdownJun 20Jun 20
YUCAUnveiling Team R70: A Deep Dive into Their Cyber Tactics and Global Hacktivist AlliancesTLDR;Dec 13, 2023Dec 13, 2023
YUCAAutomating Identification of Actor Procedural Level Details in OSINT Blogs: How AI-Powered Tools…TLDR: As cybercriminals are starting to use GPT capabilities for malicious purposes such as WormGPT. Defenders need to start adapting to…Sep 17, 20231Sep 17, 20231
YUCAUnveiling TikTok's Dark Side: The Risks of Fraud and Cybercriminal Exploitation on the 'For You'…TikTok’s “For You” algorithm boosts content based on user likes but can unintentionally aid cybercrimes, despite removal efforts.Aug 8, 2023Aug 8, 2023
YUCATracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination Part 2…Introduction:Jun 19, 2023Jun 19, 2023
YUCATracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log ExaminationThe ConceptualizationJun 1, 2023Jun 1, 2023