"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
The CVE-2024-3094 incident, also referred as XZ Attack, marks a significant event in the cybersecurity landscape, highlighting a sophisticated attack...
Read moreThe act of exposing adversary tactics and infrastructure triggers a profound operational reset within these sophisticated and persistent groups, challenging...
Read moreDeliveryCheck (also known as CAPIBAR and GAMEDAY) and Kazuar sophisticated malwares have been linked to a series of cyber-espionage campaigns,...
Read morehe digital realm is a battleground where invisible wars are fought, and the Turla Group stands as one of the...
Read moreThe cyber-espionage group RedDelta (also known as Mustang Panda, Camaro Dragon, or Bronze President), has been implicated in a series...
Read moreIn the vast ocean of open-source software, npm packages or external python library are like the countless fish that developers...
Read moreWe regularly ear in the news cybercriminals are now targeting communication platforms like Discord and Slack. Their objective? Stealing credentials....
Read moreIn our increasingly digital world, data transfer has become an integral part of daily operations for businesses and individuals alike....
Read moreKnown for their persistent and targeted attacks, APTs are finding increasingly innovative ways to exploit these open-source RATs. This blog...
Read moreIn the shadows of cyberspace, there lurks a beast, cloaked in mystery and encoded with nefarious intent. Enter BatCloak, the...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.