Resecurity
KillSec Ransomware is Attacking Healthcare Institutions in Brazil
4 days 2 hours ago
Azure AD Client Secret Leak: The Keys to Cloud
1 week 6 days ago
MITM6 + NTLM Relay: How IPv6 Auto-Configuration Leads to Full Domain Compromise
3 weeks 4 days ago
'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
1 month ago
SSRF to AWS Metadata Exposure: How Attackers Steal Cloud Credentials
1 month 1 week ago
SharePoint Zero-Day Exploit (ToolShell) - Network Infrastructure Mapping
1 month 1 week ago
Cybercriminals Attack Seychelles – Offshore Banking as a Target
1 month 2 weeks ago
Methods to Bypass OTP in Mobile Apps: Successful VAPT Scenarios
1 month 2 weeks ago
Chinese Threat: NFC-Enabled Fraud in the Philippines’ Financial Sector
2 months 1 week ago
Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach
2 months 1 week ago
Iran-Linked Threat Actors Leak Visitors and Athletes' Data from Saudi Games
2 months 3 weeks ago
Paraguay is Being Targeted by Cybercriminals - 7.4 Million Citizen Records for Sale
3 months ago
APT 41: Threat Intelligence Report and Malware Analysis
3 months ago
API Security: The Importance of Vulnerability Assessment and Penetration Testing (VAPT)
3 months 2 weeks ago
How Interlock Ransomware Affects the Defense Industrial Base Supply Chain
4 months ago
Smishing on a Massive Scale: "Panda Shop" Chinese Carding Syndicate
4 months 1 week ago
Amid Resurging Terror Threats, Banks and VASPs Must Leverage CyFI to Fight Back
4 months 2 weeks ago
How NFC-Enabled POS Terminals Facilitate Cybercriminal Money Laundering Chains
4 months 2 weeks ago
NFC Fraud Wave: Evolution of Ghost Tap on the Dark Web
4 months 3 weeks ago
Checked
2 hours 16 minutes ago
Blog
Resecurity feed