TrueBot Malware: What It Is and How to Hunt It
TrueBot malware is used for data exfiltration and has been used by infamous groups. Learn to hunt it with YARA rules in Magnet AXIOM Cyber.
TrueBot malware is used for data exfiltration and has been used by infamous groups. Learn to hunt it with YARA rules in Magnet AXIOM Cyber.
In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment.
If you’re not familiar with infostealer malware—a type of malware specifically designed to locate and exfiltrate credentials—consider yourself lucky. And consider being prepared.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering techniques and tactics used by the threat actor behind the CL0P ransomware.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a joint cybersecurity advisory uncovering a new attack by a nation-state sponsored attacker dubbed as “Volt Typhoon” (also called BRONZE SILHOUETTE) where the threat actor leverages fileless techniques also known as “Living-Off-The-Land” (LOTL) techniques.
The Cybersecurity and Infrastructure Security Agency (CISA) & partners recently released a “#StopRansomware Guide” Cybersecurity Information Sheet (CSI) which aims at providing guidance to organizations to reduce the impact of ransomware incidents and a checklist of best practices for responding to these threats.
Magnet GRAYKEY – a mobile device forensic tool that can provide same-day access, complete evidence control, and comprehensive data extraction for Android and iOS devices.
Since Magnet Forensics’ inception, we’ve been dedicated to our mission statement: Seek Justice and Protect the Innocent. Combatting Child Sexual Abuse Material (CSAM) is a big part of that.
This week, a joint cybersecurity advisory was issued by the cybersecurity authorities (AA22-110A) of the United States, Canada, Australia, New Zealand and United Kingdom to provide an overview of Russian state-sponsored cyber operations and TTPs.
In this blog, we will walk you through those different considerations, provide resources, and outline some best practices to help you position Magnet GRAYKEY to your decision makers so you can increase the chances of securing funding.
Notifications