RSS Generator 2.1.1 http://www.rssboard.org/rss-specification Resecurity https://www.resecurity.com/ Blog en https://www.resecurity.com/themes/modern/images/logo-dark.svg Resecurity / 150 40 Resecurity Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructure https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructure Tue, 25 Mar 2025 00:00:00 -0500 Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 3 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-3 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-3 Fri, 21 Mar 2025 00:00:00 -0500 Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 2 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-2 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-2 Thu, 20 Mar 2025 00:00:00 -0500 Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 1 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-1 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-1 Wed, 19 Mar 2025 00:00:00 -0500 DragonForce Ransomware - Reverse Engineering Report https://www.resecurity.com/blog/article/dragonforce-ransomware-reverse-engineering-report https://www.resecurity.com/blog/article/dragonforce-ransomware-reverse-engineering-report Mon, 03 Mar 2025 00:00:00 -0600 DragonForce Ransomware Group is Targeting Saudi Arabia https://www.resecurity.com/blog/article/dragonforce-ransomware-group-is-targeting-saudi-arabia https://www.resecurity.com/blog/article/dragonforce-ransomware-group-is-targeting-saudi-arabia Thu, 27 Feb 2025 00:00:00 -0600 Kuwait Under Attack by Smishing Triad - Law Enforcement Takes Action https://www.resecurity.com/blog/article/kuwait-under-attack-by-smishing-triad-law-enforcement-takes-action https://www.resecurity.com/blog/article/kuwait-under-attack-by-smishing-triad-law-enforcement-takes-action Fri, 14 Feb 2025 00:00:00 -0600 The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets https://www.resecurity.com/blog/article/the-rise-of-cyber-espionage-uav-and-c-uav-technologies-as-targets https://www.resecurity.com/blog/article/the-rise-of-cyber-espionage-uav-and-c-uav-technologies-as-targets Thu, 13 Feb 2025 00:00:00 -0600 ICAO and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists https://www.resecurity.com/blog/article/icao-and-acao-breached-cyberespionage-groups-targeting-aviation-safety-specialists https://www.resecurity.com/blog/article/icao-and-acao-breached-cyberespionage-groups-targeting-aviation-safety-specialists Tue, 04 Feb 2025 00:00:00 -0600 Navigating the Cybersecurity Frontier in 2025: Adapting to Evolving Threats https://www.resecurity.com/blog/article/navigating-the-cybersecurity-frontier-in-2025-adapting-to-evolving-threats https://www.resecurity.com/blog/article/navigating-the-cybersecurity-frontier-in-2025-adapting-to-evolving-threats Tue, 07 Jan 2025 00:00:00 -0600 Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE - Smishing Triad in Action https://www.resecurity.com/blog/article/cybercriminals-impersonate-dubai-police-to-defraud-consumers-in-the-uae-smishing-triad-in-action https://www.resecurity.com/blog/article/cybercriminals-impersonate-dubai-police-to-defraud-consumers-in-the-uae-smishing-triad-in-action Wed, 11 Dec 2024 00:00:00 -0600 How VR May Transform Security Operations Centers (SOCs) https://www.resecurity.com/blog/article/how-vr-may-transform-security-operations-centers-socs https://www.resecurity.com/blog/article/how-vr-may-transform-security-operations-centers-socs Sun, 08 Dec 2024 00:00:00 -0600 Digital Echo Chambers and Erosion of Trust - Key Threats to the US Elections https://www.resecurity.com/blog/article/digital-echo-chambers-and-erosion-of-trust-key-threats-to-the-us-elections https://www.resecurity.com/blog/article/digital-echo-chambers-and-erosion-of-trust-key-threats-to-the-us-elections Wed, 23 Oct 2024 00:00:00 -0500 Cybercriminals Are Targeting AI Agents and Conversational Platforms: Emerging Risks for Businesses and Consumers https://www.resecurity.com/blog/article/cybercriminals-are-targeting-ai-agents-and-conversational-platforms-emerging-risks-for-businesses-and-consumers https://www.resecurity.com/blog/article/cybercriminals-are-targeting-ai-agents-and-conversational-platforms-emerging-risks-for-businesses-and-consumers Wed, 09 Oct 2024 00:00:00 -0500 Qatar Is Accelerating Oversight on Data Breaches and Cybersecurity Incidents https://www.resecurity.com/blog/article/qatar-is-accelerating-oversight-on-data-breaches-and-cybersecurity-incidents https://www.resecurity.com/blog/article/qatar-is-accelerating-oversight-on-data-breaches-and-cybersecurity-incidents Thu, 03 Oct 2024 00:00:00 -0500 Iranian Cyber Actors (IRGC) - Targeting the 2024 U.S. Presidential Election https://www.resecurity.com/blog/article/iranian-cyber-actors-irgc-targeting-the-2024-us-presidential-election https://www.resecurity.com/blog/article/iranian-cyber-actors-irgc-targeting-the-2024-us-presidential-election Sat, 28 Sep 2024 00:00:00 -0500 Resecurity introduced Context AI to accelerate threat intelligence and incident response capabilities https://www.resecurity.com/blog/article/resecurity-introduced-context-ai-to-accelerate-threat-intelligence-and-incident-response-capabilities https://www.resecurity.com/blog/article/resecurity-introduced-context-ai-to-accelerate-threat-intelligence-and-incident-response-capabilities Mon, 05 Aug 2024 00:00:00 -0500 C2 Frameworks - Threat Hunting in Action with YARA Rules https://www.resecurity.com/blog/article/c2-frameworks-threat-hunting-in-action-with-yara-rules https://www.resecurity.com/blog/article/c2-frameworks-threat-hunting-in-action-with-yara-rules Fri, 02 Aug 2024 00:00:00 -0500 Terrorist Activity is Accelerating in Cyberspace - Risk Precursor to Summer Olympics and Elections https://www.resecurity.com/blog/article/terrorist-activity-is-accelerating-in-cyberspace-risk-precursor-to-summer-olympics-and-elections https://www.resecurity.com/blog/article/terrorist-activity-is-accelerating-in-cyberspace-risk-precursor-to-summer-olympics-and-elections Thu, 25 Jul 2024 00:00:00 -0500 CVE-2024-4879 and CVE-2024-5217 (ServiceNow RCE) Exploitation in a Global Reconnaissance Campaign https://www.resecurity.com/blog/article/cve-2024-4879-and-cve-2024-5217-servicenow-rce-exploitation-in-a-global-reconnaissance-campaign https://www.resecurity.com/blog/article/cve-2024-4879-and-cve-2024-5217-servicenow-rce-exploitation-in-a-global-reconnaissance-campaign Wed, 24 Jul 2024 00:00:00 -0500