The prolific ransomware group has shifted away from phishing as the method of entry into corporate networks, and is now using initial access brokers as well as its own tools to optimize its most recent attacks.
Google Dorks Database |
Exploits Vulnerability |
Exploit Shellcodes |
CVE List |
Tools/Apps |
News/Aarticles |
Phishing Database |
Deepfake Detection |
Trends/Statistics & Live Infos |
Tags:
Black Basta Develops Custom Malware in Wake of Qakbot Takedown