
Mentions in press and media 11
Date | Title | Description |
12.11.2024 | The Evolving Landscape of Cybersecurity: A Deep Dive into OSINT and AI Defense Mechanisms | In the digital age, information is power. Cybersecurity is the fortress that protects this power. As threats evolve, so must our defenses. Two critical components in this landscape are Open Source Intelligence (OSINT) and advanced AI defens... |
11.11.2024 | Хитрости Красной команды | Введение Пассивная разведка (OSINT) Сосредоточьтесь на сборе информации о целевой компании и её сотрудниках. Ресурсы, которые могут быть полезны для этого (подробное объяснение приведено в разделе "ИНСТРУМЕНТЫ И МЕТОДЫ" ниже): Веб... |
16.06.2023 | Перехват трафика как вектор атаки на пользователей блокчейн-проектов | Привет, Хабр! Меня зовут Игорь Агиевич, я специалист по безопасности распределенных реестров в компании Positive Technologies. C 2021 года занимаюсь безопасностью в сфере блокчейн-технологий, окончил курс MixBytes по безопасности смарт-конт... |
15.12.2021 | Microsoft : Guidance for preventing, detecting and hunting for CVE-2021-44228 Log4j 2 exploitation | Microsoft's unified threat intelligence team, comprising the Microsoft Threat Intelligence Center (MSTIC), Microsoft 365 Defender Threat Intelligence Team, RiskIQ, and the Microsoft Detection and Response Team (DART), among others, have bee... |
25.10.2021 | IronNet : Russian cyber attack campaigns and actors | Oct 25, 2021 Editor's Note: This post, originally published on December 21, 2020, by Adam Hlavek with Kimberly Ortiz, includes updates dated March 1, April 6, 2021, May 28, 2021, and September 7, 2021. Table of Contents 1. Most recent Russi... |
10.09.2021 | IronNet Cybersecurity : Russian cyber attack campaigns and actors | Sep 10, 2021 Editor's Note: This post, originally published on December 21, 2020, by Adam Hlavek with Kimberly Ortiz, includes updates dated March 1, April 6, 2021, May 28, 2021, and September 7, 2021. Table of Contents 1. Most recent Russi... |
23.04.2021 | More SolarWinds command and control hacking servers found | Researchers have found that the command and control (C2) server infrastructure for the Russia-attributed SolarWinds espionage campaign is substantially larger than first thought after discovering an additional 18 servers used to manage malw... |
06.04.2020 | Как я первым узнал название сети шаурмы от Додо Пиццы | Привет! Я учусь на специалиста по информационной безопасности и веду в телеграме канал «Мамкин Хакер», в котором буду давать советы о защите своих данных и получению чужих. В этой статье поделюсь своим способом нахождения инсайдов и раскрою... |
02.04.2019 | We found a massive spam operation — and sunk its server | For ten days in March, millions were caught in the same massive spam campaign. Each email looked like it came from someone the recipient knew: the spammer took stolen email addresses and passwords, quietly logged into their email account, s... |
25.07.2017 | RiskIQ Reveals Digital Footprint Snapshot - On-demand, Cost-Effective External Asset Intelligence Report | LONDON, UK – July 25, 2017 – RiskIQ, the leader in digital threat management, today unveiled RiskIQ Digital Footprint Snapshot, which provides organisations with an automated, on-demand intelligence report of their internet-facing digital a... |
Show more