Show Notes
APT SideCopy Targeting Indian Government Entities
WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks
Fog of war: how the Ukraine conflict transformed the cyber threat landscape
HWP Malware Using the Steganography Technique: RedEyes (ScarCruft)
Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1