InAardvark InfinitybyAardvark InfinitySavant-Level CTI Report on Cozy Bear (APT29)UUID: b15f4a7e-3d4b-4b76–9371–45025e8f7a1bJul 27
Alok kumarSmuggling Files via HTML — Bypassing Web proxies & Spam FiltersUnderstanding HTML Smuggling — MITRE ATT&CK Tactic: Defense EvasionJul 4, 2023
Patrik ŽákTeamViewer attacked by hackersTeamViewer warns that its corporate environment has been compromised by a hacking attack by the ATP29 groupJun 28Jun 28
InConfluera EngineeringbyNmukherjAnatomy of SolarWind AttackOn Sunday, December 13, 2020, Reuters reported that hackers compromised the private networks of dozens of US companies and government…Dec 17, 2020Dec 17, 2020
Efi JeremiahThe Hidden Danger in Your Email: Microsoft’s Security LessonIn a striking revelation, Microsoft’s recent security breach, led by the notorious group Midnight Blizzard (APT29 or Cozy Bear), unveils a…Jan 23Jan 23
InAardvark InfinitybyAardvark InfinitySavant-Level CTI Report on Cozy Bear (APT29)UUID: b15f4a7e-3d4b-4b76–9371–45025e8f7a1bJul 27
Alok kumarSmuggling Files via HTML — Bypassing Web proxies & Spam FiltersUnderstanding HTML Smuggling — MITRE ATT&CK Tactic: Defense EvasionJul 4, 2023
Patrik ŽákTeamViewer attacked by hackersTeamViewer warns that its corporate environment has been compromised by a hacking attack by the ATP29 groupJun 28
InConfluera EngineeringbyNmukherjAnatomy of SolarWind AttackOn Sunday, December 13, 2020, Reuters reported that hackers compromised the private networks of dozens of US companies and government…Dec 17, 2020
Efi JeremiahThe Hidden Danger in Your Email: Microsoft’s Security LessonIn a striking revelation, Microsoft’s recent security breach, led by the notorious group Midnight Blizzard (APT29 or Cozy Bear), unveils a…Jan 23
InDeep Learning for CybersecuritybyBalaji PrasadSolarwinds Breach: Are sandboxes and signature based tools still effective?APT attackers have become very effective in bypassing traditional defenses as the recent breach shows. Can AI help solve this conundrum?Dec 15, 2020
InThe Startupby@johnnychronix“Celebrity” HackersBy now, we’ve all heard of the existence of hackers and hacker groups. While most of us can only actually “name” a few (if any) of them…Aug 5, 2020