Browsing Tag
Unit 42
2 posts
Weekly Top 10: 05.05.2025: Using Trusted Protocols Against You: Gmail as a C2 Mechanism, Shadow Roles: AWS Defaults Can Open the Door to Service Takeover, Gremlin Stealer: New Stealer on Sale in Underground Forum, and More.
Using Trusted Protocols Against You: Gmail as a C2 Mechanism, Shadow Roles: AWS Defaults Can Open the Door to Service Takeover, Gremlin Stealer: New Stealer on Sale in Underground Forum, and 7 More.
May 5, 2025 16:00 GMT
Weekly Top 10 — 5.27.2024 — Google Discovers Fourth Zero-Day in Chrome, Popular Cloud Services Used to Masquerade Smishing Links, VMs Used for Defense Evasion in MITRE Cyber Attack, and More.
Google Discovers Fourth Zero-Day in Chrome This Month, Popular Cloud Services Used to Masquerade Smishing Links, Virtual Machines Used for Defense Evasion in MITRE Cyber Attack and 7 more cybersecurity stories...
May 27, 2024 09:00 GMT