Remote Monitoring & Management (RMM) tooling is taking over the cybercrime landscape. And it keeps growing.
Alongside Deception.Pro, we observed follow-on activity from a Bluetrait campaign in an environment built to resemble a travel firm. Result? Even more RMMs. blog.deception.pro/blog/hok-int...
03.02.2026 16:23
π 2
π 2
π¬ 1
π 0
π€ Got a talk idea thatβll melt minds and firewalls?
BSides Charleston 2025 CFP is OPEN!
Submit now: forms.gle/NaaR5ngtwdtd...
#infosec #BSidesCHS
03.08.2025 16:50
π 1
π 0
π¬ 0
π 0
GitHub - MalBeacon/what-is-this-stealer: A repository of credential stealer formats
A repository of credential stealer formats . Contribute to MalBeacon/what-is-this-stealer development by creating an account on GitHub.
Introducing: What is this stealer?
A new repository that allows for you to identify Stealer family by the system information text file format commonly included in stealer malware exfiltration logs. Includes Yara rules!
Check it out and contribute!
github.com/MalBeacon/wh...
13.01.2025 16:11
π 5
π 2
π¬ 0
π 0