Source Link Trustless Evidence: Web 3 Is Helping Document War Crimes in Ukraine CoinDesk
Ukraine
-
-
Mobile SecuritySecurity
Evaluation of cyber activities and the threat landscape in Ukraine
by GReATby GReATSource Link Introduction When the war in Ukraine broke out, many analysts were surprised…
-
Source Link A growing number of threat actors are using the ongoing Russo-Ukrainian war…
-
Source Link At least six different Russia-aligned actors launched no less than 237 cyberattacks…
-
Malware
Ukraine Thwart Russian Industroyer 2 Malware Attack on Energy Provider
by Deeba Ahmedby Deeba AhmedSource Link The Computer Emergency Response Team of Ukraine (CERT-UA) claims to thwart a…
-
Source Link At least three different advanced persistent threat (APT) groups from across the…
-
Source Link The Russian invasion of Ukraine has demonstrated the law of unintended consequences…
-
Source Link The Ukrainian Defense Ministry’s Directorate of Intelligence claims the personal data includes…
-
Cyber Attacks
Hackers Increasingly Using ‘Browser-in-the-Browser’ Technique in Ukraine Related Attacks
Source Link A Belarusian threat actor known as Ghostwriter (aka UNC1151) has been spotted…
-
Cyber Attacks
Hackers Increasingly Using ‘Browser in a Browser’ Technique in Ukraine Related Attacks
Source Link A Belarusian threat actor known as Ghostwriter (aka UNC1151) has been spotted…