
LABScon23 Replay | macOS Components Used in North Korean Crypto-Heists
Greg Lesnewich takes us on a tour of North Korean APTs targeting macOS and explores techniques for tracking an increasingly active threat cluster.
Read More
Greg Lesnewich takes us on a tour of North Korean APTs targeting macOS and explores techniques for tracking an increasingly active threat cluster.
Covering investigations into Turla, Magna Bear and REvil, this talks offers a fascinating insight into how researchers unmask threat actor identities.
Take a unique look inside Iran's drone and missile program as Adam Rawnsley charts the rise of Mado, a key IRGC drone company.
SentinelLABS has discovered a novel malware variant of AcidRain that could be targeting telecoms networks in Ukraine.
Doppelgänger, a sophisticated Russia-aligned operation, targets German public opinion with disinformation ahead of elections.
The I-Soon leak reveals the maturing nature of China’s cyber espionage and a competitive hacker marketplace driven by government demands.
Kris McConkey reveals the rise of a cyber espionage 'superpower,' impacting 35+ countries with sophisticated tools like ShadowPad.
Threat actors leverage cloud services to conduct massive smishing campaign through AWS Simple Notification Service.
China's claims of hacks and espionage lack the rigorous technical detail seen in western threat intel. Why the asymmetry, and how does it benefit the PRC?
New ScarCruft activity suggests the adversary is planning to target cybersecurity professionals and businesses.