Cybersecurity Wiretap #64: From Weaponized Pull Requests to Hidden IIS Modules with a Focus on Stealth and Supply Chain Abuse (week of 07/07/2025) AndySvints · Posted on July 14, 2025July 14, 2025
Cybersecurity Wiretap #53: From FOG Ransomware to Sock(et) Puppet Tactics with a Focus on Ransomware Ecosystem Evolution (week of 04/21/2025) AndySvints · Posted on April 28, 2025April 28, 2025