• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From bitsight.com

Exfiltration over Telegram Bots: Skidding Infostealer Logs | Bitsight

1 1

Bitsight’s visibility over infostealer malware which exfiltrates over Telegram suggests that the most infected countries are the USA, Turkey, and Russia, followed by India and Germany.

22h ago

From bitsight.com

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems | Bitsight

0 1

Recent investigation by Bitsight TRACE has discovered multiple critical 0-day vulnerabilities across six ATG systems from five different vendors.

on Sep 24

From bitsight.com

Do We Need Yet Another Vulnerability Scoring System? For SSVC, That's a YASS | Bitsight

0 0

Want to know about Yet Another Vulnerability Scoring System (YASS)? Ben Edwards breaks down Stakeholder Specific Vulnerability Categorization and how to make it work.

on Sep 12

From bitsight.com

7777 Botnet – Insights into a Multi-Target Botnet | Bitsight

0 0

Our latest research, a collaboration between Bitsight TRACE & the security researcher Gi7w0rm, has uncovered additional details & information about the 7777 Botnet.

on Aug 29

From bitsight.com

CrowdStrike Timeline Mystery | Bitsight

0 1

Bitsight's analysis of the CrowdStrike outage and timeline mysteries.

on Jul 25

From bitsight.com

The Impact of the Kaspersky Ban | Bitsight

0 0

How will the prohibition of Kaspersky Lab, Inc. impact global users? Read our analysis of the prevalence of Kaspersky products used by organizations around the globe.

on Jul 9

From bitsight.com

Evaluating dependence on NVD | Bitsight

0 0

Learn about what the latest reduction in capacity in the NVD means for the state of vulnerabilities.

on Jun 26

From bitsight.com

The xz apocalypse that almost was* | Bitsight

0 0

Dive into a significant cybersecurity scare that could have led to widespread chaos, highlighting the vulnerabilities that were exposed and the swift actions taken to prevent disaster.

on May 20

From bitsight.com

Cyber Risk in 2024: Combatting Third-Party Risk | Bitsight

0 0

The state of cybersecurity is becoming increasingly complicated, with economic uncertainty and new regulations only creating new challenges.

on Mar 2

From bitsight.com

Hunting PrivateLoader: The malware behind InstallsKey PPI service | Bitsight

0 0

Read the latest Bitsight research on PrivateLoader including important updates recently, including a new string encryption algorithm, a new alternative communication protocol and more.

on Mar 2

From bitsight.com

Data Insights on AgentTesla and OriginLogger Victims | Bitsight

0 0

AgentTesla (also known as OriginLogger) remains a prevalent commodity stealer, being daily distributed, mainly via email attachments

on Jan 20

From bitsight.com

Unveiling Socks5Systemz: The Rise of a New Proxy Service via PrivateLoader and Amadey | Bitsight

0 0

Recently, our Threat Research team discovered a new malware sample, distributed by the PrivateLoader and Amadey loaders. Learn more.

on Nov 6

From bitsight.com

Bitsight identifies nearly 100,000 exposed industrial control systems | Bitsight

0 0

Bitsight has identified nearly 100,000 exposed industrial control systems (ICS) potentially allowing an attacker to access and control physical infrastructure.

on Oct 4, 2023