Cybertronium Blog

  • Home
  • Archive
  • Contact

PostList

  • Post image
    Canadian customer service company, Comm100, compromised in a supply chain attack by suspected Chinese hackers
    October 2, 2022
  • Post image
    LockBit 2.0 ransomware employ social engineering through fake copyright infringement emails
    June 29, 2022
  • Post image
    Network access with zero trust might be more important
    January 3, 2022
  • Post image
    Fake downloads are being used to distribute password-stealing and keylogging malware
    December 17, 2021
  • Post image
    The Most Significant Threats to Cloud Security
    December 8, 2021
  • Post image
    Red team, blue team game
    December 6, 2021
  • Post image
    ‘Passwordless’ in the future?
    December 6, 2021
  • Post image
    Beginner’s guide to build a Security information and event management (SIEM) solution using open-sourced technologies
    December 1, 2021
  • Post image
    Why has endpoint security become important lately?
    November 18, 2021
  • Post image
    Build your own Threat Intelligence Platform (TIP) at low or no cost
    November 18, 2021
LockBit 2.0 ransomware employ social engineering through fake copyright infringement emails
Awareness, Threat Intelligence

LockBit 2.0 ransomware employ social engineering through fake copyright infringement emails

Priyanka-Jayakumar Priyanka-Jayakumar Jun 29, 2022
Newer posts >>
Cybertronium Blog

© 2023 Cybertronium Sdn. Bhd.