Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was ...
A new ransomware operator has emerged that relies on open source malware to launch double-extortion attacks that have claimed several victims. However, its ransomware has a flaw that gives victims a ...
Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and Babuk ransomware. Cisco Talos researchers assess with medium ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results