18,000 ‘Script Kiddies’ Hacked: The Untold Criminal Intelligence Perspective
When CloudSEK researchers revealed that over 18,000 wannabe hackers had been compromised through a trojanized malware builder, the cybersecurity community's...
Chief Product & Engineering Officer at XRATOR
- - -
I am an Entrepreneur and a Telecommunication Engineer with a post-graduate degree in Criminology. Before cofounding XRATOR, I was a cyber-threat intelligence researcher, analyst and investigator for large multi-national companies and the antivirus industry.
Outside my business activities, I like to share my knowledge by teaching threat intelligence, cyber-risk management and cybersecurity leadership in several French universities and Business Schools.
When CloudSEK researchers revealed that over 18,000 wannabe hackers had been compromised through a trojanized malware builder, the cybersecurity community's...
False flag operations in cyberspace are more than funky tactical attempts at simplistic deception; they are calculated moves within a...
Threat and vulnerability management has become a critical task for organizations of all sizes. Traditional methods of prioritizing vulnerabilities based...
Cybercrime has evolved into a sophisticated industry, with botnets playing a critical role in facilitating various illegal activities. These networks...
Agenda 1. Introduction 2. LockBit Business Model Breakdown 3. Analyzing the Affiliate Network Metrics 4. Geographic Insights and Market Analysis...
APT44, also known as Sandworm, has been identified by Mandiant as a major threat actor sponsored by Russian military intelligence....
In the digital age, economic sanctions are no longer just about freezing assets and banning trade. The emergence of cryptocurrency...
The CVE-2024-3094 incident, also referred as XZ Attack, marks a significant event in the cybersecurity landscape, highlighting a sophisticated attack...
The act of exposing adversary tactics and infrastructure triggers a profound operational reset within these sophisticated and persistent groups, challenging...
1. Introduction In this comprehensive article, we delve into the difficult exercice of cybersecurity crystal ball, exploring the potential...
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.