Efstratios LontzetidisGreece’s 2024 Cyber Threat Landscape, Trends and PredictionsThe cyber threat landscape in Greece evolved significantly in 2024, characterized by escalating ransomware attacks, sophisticated Advanced…3d ago
InCheckmarx ZerobyJossef Harush KadouriBackdoor Discovered in xz: The Most Advanced Supply Chain Attack Known to DateThe xz project, a tool used by many Linux distributions for compressing files, was compromised by a malicious actor who gradually took over…Mar 313
InAardvark InfinitybyAardvark Infinity“APT1 Cipher Breach #81”In this hyperrealistic 3D close-up, you’re face-to-face with the very anatomy of a cyber war. The scene zooms in on the cracked marble…Oct 17Oct 17
InAardvark InfinitybyAardvark InfinityProgram Title: Central Intelligence Joker TCP ProgramAuthor: System Admin Bash BuilderSep 17Sep 17
Efstratios LontzetidisGreece’s 2024 Cyber Threat Landscape, Trends and PredictionsThe cyber threat landscape in Greece evolved significantly in 2024, characterized by escalating ransomware attacks, sophisticated Advanced…3d ago
InCheckmarx ZerobyJossef Harush KadouriBackdoor Discovered in xz: The Most Advanced Supply Chain Attack Known to DateThe xz project, a tool used by many Linux distributions for compressing files, was compromised by a malicious actor who gradually took over…Mar 313
InAardvark InfinitybyAardvark Infinity“APT1 Cipher Breach #81”In this hyperrealistic 3D close-up, you’re face-to-face with the very anatomy of a cyber war. The scene zooms in on the cracked marble…Oct 17
InAardvark InfinitybyAardvark InfinityProgram Title: Central Intelligence Joker TCP ProgramAuthor: System Admin Bash BuilderSep 17
InAardvark InfinitybyAardvark InfinityProgram Title: Chinese Manufacturing APT1 Simulation ScriptAuthor: System Admin Bash BuilderSep 17
InAardvark InfinitybyAardvark InfinityComprehensive List of Known Chinese Advanced Persistent Threat (APT) GroupsHighlighting Their Activities, tools, and targets.Jul 21
Agape HearTsAnti-MalwareThe digital world offers convenience and connection, but it also harbors hidden dangers. Malicious software, or malware, lurks in various…Mar 22