RSS Generator 2.1.1http://www.rssboard.org/rss-specificationResecurity
https://www.resecurity.com/
Blogenhttps://www.resecurity.com/themes/modern/images/logo-dark.svgResecurity
/
15040ResecurityBlacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure
https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructure
https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructureTue, 25 Mar 2025 00:00:00 -0500Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 3
https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-3
https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-3Fri, 21 Mar 2025 00:00:00 -0500Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 2
https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-2
https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-2Thu, 20 Mar 2025 00:00:00 -0500Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 1
https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-1
https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-1Wed, 19 Mar 2025 00:00:00 -0500DragonForce Ransomware - Reverse Engineering Report
https://www.resecurity.com/blog/article/dragonforce-ransomware-reverse-engineering-report
https://www.resecurity.com/blog/article/dragonforce-ransomware-reverse-engineering-reportMon, 03 Mar 2025 00:00:00 -0600DragonForce Ransomware Group is Targeting Saudi Arabia
https://www.resecurity.com/blog/article/dragonforce-ransomware-group-is-targeting-saudi-arabia
https://www.resecurity.com/blog/article/dragonforce-ransomware-group-is-targeting-saudi-arabiaThu, 27 Feb 2025 00:00:00 -0600Kuwait Under Attack by Smishing Triad - Law Enforcement Takes Action
https://www.resecurity.com/blog/article/kuwait-under-attack-by-smishing-triad-law-enforcement-takes-action
https://www.resecurity.com/blog/article/kuwait-under-attack-by-smishing-triad-law-enforcement-takes-actionFri, 14 Feb 2025 00:00:00 -0600The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets
https://www.resecurity.com/blog/article/the-rise-of-cyber-espionage-uav-and-c-uav-technologies-as-targets
https://www.resecurity.com/blog/article/the-rise-of-cyber-espionage-uav-and-c-uav-technologies-as-targetsThu, 13 Feb 2025 00:00:00 -0600ICAO and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists
https://www.resecurity.com/blog/article/icao-and-acao-breached-cyberespionage-groups-targeting-aviation-safety-specialists
https://www.resecurity.com/blog/article/icao-and-acao-breached-cyberespionage-groups-targeting-aviation-safety-specialistsTue, 04 Feb 2025 00:00:00 -0600Navigating the Cybersecurity Frontier in 2025: Adapting to Evolving Threats
https://www.resecurity.com/blog/article/navigating-the-cybersecurity-frontier-in-2025-adapting-to-evolving-threats
https://www.resecurity.com/blog/article/navigating-the-cybersecurity-frontier-in-2025-adapting-to-evolving-threatsTue, 07 Jan 2025 00:00:00 -0600Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE - Smishing Triad in Action
https://www.resecurity.com/blog/article/cybercriminals-impersonate-dubai-police-to-defraud-consumers-in-the-uae-smishing-triad-in-action
https://www.resecurity.com/blog/article/cybercriminals-impersonate-dubai-police-to-defraud-consumers-in-the-uae-smishing-triad-in-actionWed, 11 Dec 2024 00:00:00 -0600How VR May Transform Security Operations Centers (SOCs)
https://www.resecurity.com/blog/article/how-vr-may-transform-security-operations-centers-socs
https://www.resecurity.com/blog/article/how-vr-may-transform-security-operations-centers-socsSun, 08 Dec 2024 00:00:00 -0600Digital Echo Chambers and Erosion of Trust - Key Threats to the US Elections
https://www.resecurity.com/blog/article/digital-echo-chambers-and-erosion-of-trust-key-threats-to-the-us-elections
https://www.resecurity.com/blog/article/digital-echo-chambers-and-erosion-of-trust-key-threats-to-the-us-electionsWed, 23 Oct 2024 00:00:00 -0500Cybercriminals Are Targeting AI Agents and Conversational Platforms: Emerging Risks for Businesses and Consumers
https://www.resecurity.com/blog/article/cybercriminals-are-targeting-ai-agents-and-conversational-platforms-emerging-risks-for-businesses-and-consumers
https://www.resecurity.com/blog/article/cybercriminals-are-targeting-ai-agents-and-conversational-platforms-emerging-risks-for-businesses-and-consumersWed, 09 Oct 2024 00:00:00 -0500Qatar Is Accelerating Oversight on Data Breaches and Cybersecurity Incidents
https://www.resecurity.com/blog/article/qatar-is-accelerating-oversight-on-data-breaches-and-cybersecurity-incidents
https://www.resecurity.com/blog/article/qatar-is-accelerating-oversight-on-data-breaches-and-cybersecurity-incidentsThu, 03 Oct 2024 00:00:00 -0500Iranian Cyber Actors (IRGC) - Targeting the 2024 U.S. Presidential Election
https://www.resecurity.com/blog/article/iranian-cyber-actors-irgc-targeting-the-2024-us-presidential-election
https://www.resecurity.com/blog/article/iranian-cyber-actors-irgc-targeting-the-2024-us-presidential-electionSat, 28 Sep 2024 00:00:00 -0500Resecurity introduced Context AI to accelerate threat intelligence and incident response capabilities
https://www.resecurity.com/blog/article/resecurity-introduced-context-ai-to-accelerate-threat-intelligence-and-incident-response-capabilities
https://www.resecurity.com/blog/article/resecurity-introduced-context-ai-to-accelerate-threat-intelligence-and-incident-response-capabilitiesMon, 05 Aug 2024 00:00:00 -0500C2 Frameworks - Threat Hunting in Action with YARA Rules
https://www.resecurity.com/blog/article/c2-frameworks-threat-hunting-in-action-with-yara-rules
https://www.resecurity.com/blog/article/c2-frameworks-threat-hunting-in-action-with-yara-rulesFri, 02 Aug 2024 00:00:00 -0500Terrorist Activity is Accelerating in Cyberspace - Risk Precursor to Summer Olympics and Elections
https://www.resecurity.com/blog/article/terrorist-activity-is-accelerating-in-cyberspace-risk-precursor-to-summer-olympics-and-elections
https://www.resecurity.com/blog/article/terrorist-activity-is-accelerating-in-cyberspace-risk-precursor-to-summer-olympics-and-electionsThu, 25 Jul 2024 00:00:00 -0500CVE-2024-4879 and CVE-2024-5217 (ServiceNow RCE) Exploitation in a Global Reconnaissance Campaign
https://www.resecurity.com/blog/article/cve-2024-4879-and-cve-2024-5217-servicenow-rce-exploitation-in-a-global-reconnaissance-campaign
https://www.resecurity.com/blog/article/cve-2024-4879-and-cve-2024-5217-servicenow-rce-exploitation-in-a-global-reconnaissance-campaignWed, 24 Jul 2024 00:00:00 -0500