0
Skip to Content
Digital Data Hive
Digital Data Hive
The Daily Buzz
The Latest Buzz
About
Contact
Reference Guides
Threat Groups
Login Account
Digital Data Hive
Digital Data Hive
The Daily Buzz
The Latest Buzz
About
Contact
Reference Guides
Threat Groups
Login Account
The Daily Buzz
The Latest Buzz
About
Contact
Reference Guides
Threat Groups
Login Account
Inside TA397’s Playbook - From Phishing Emails to RATs
Cybersecurity Emilia Mancilla 12/18/24 Cybersecurity Emilia Mancilla 12/18/24

Inside TA397’s Playbook - From Phishing Emails to RATs

TA397, also known as UAC-0001, uses phishing emails, malicious macros, and Remote Access Trojans (RATs) to target high-profile entities, primarily in Ukraine.

Read More
Inside Operation Digital Eye - How Hackers Used Legitimate Tools for Infiltration
Cybersecurity Emilia Mancilla 12/12/24 Cybersecurity Emilia Mancilla 12/12/24

Inside Operation Digital Eye - How Hackers Used Legitimate Tools for Infiltration

Read More
The Breach from Next Door. How Russian APT Exploited Wi-Fi to Infiltrate Their Target
Cybersecurity Emilia Mancilla 11/25/24 Cybersecurity Emilia Mancilla 11/25/24

The Breach from Next Door. How Russian APT Exploited Wi-Fi to Infiltrate Their Target

Read More
Beware the Wolf- WolfsBane Marks Its Linux Territory
Cybersecurity Emilia Mancilla 11/22/24 Cybersecurity Emilia Mancilla 11/22/24

Beware the Wolf- WolfsBane Marks Its Linux Territory

Read More
Fortinet VPN Flaw: How Hackers Can Sneak Past Security Without a Trace
Cybersecurity Emilia Mancilla 11/21/24 Cybersecurity Emilia Mancilla 11/21/24

Fortinet VPN Flaw: How Hackers Can Sneak Past Security Without a Trace

Read More
T-Mobile Breached Again: A Closer Look at Salt Typhoon’s Espionage Tactics
Cybersecurity Emilia Mancilla 11/20/24 Cybersecurity Emilia Mancilla 11/20/24

T-Mobile Breached Again: A Closer Look at Salt Typhoon’s Espionage Tactics

Read More
Did Apple Lie to Us? The Truth Behind M-Series Chips' Security Promises.
Cybersecurity Emilia Mancilla 3/25/24 Cybersecurity Emilia Mancilla 3/25/24

Did Apple Lie to Us? The Truth Behind M-Series Chips' Security Promises.

Read More
Scattered Spider is Causing Arachnophobia
Cybersecurity Emilia Mancilla 10/29/23 Cybersecurity Emilia Mancilla 10/29/23

Scattered Spider is Causing Arachnophobia

Read More
Elevating Cybersecurity with NIST CSF 2.0
Cybersecurity Emilia Mancilla 8/21/23 Cybersecurity Emilia Mancilla 8/21/23

Elevating Cybersecurity with NIST CSF 2.0

Read More
Cybersecurity - A Pillar of Modern Business - According to the CISA
Cybersecurity Emilia Mancilla 8/8/23 Cybersecurity Emilia Mancilla 8/8/23

Cybersecurity - A Pillar of Modern Business - According to the CISA

Read More
Understand your Network - Simplifying Netstat with the Network Top Processes Program!
Cybersecurity Emilia Mancilla 7/27/23 Cybersecurity Emilia Mancilla 7/27/23

Understand your Network - Simplifying Netstat with the Network Top Processes Program!

Read More
Navigating the Aftermath: Dealing with the Impact of an Application Security Breach
Cybersecurity, Digital Forensics Emilia Mancilla 6/26/23 Cybersecurity, Digital Forensics Emilia Mancilla 6/26/23

Navigating the Aftermath: Dealing with the Impact of an Application Security Breach

Read More