Tactics
- APPLICATIONS
DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics
Russian companies have been targeted as part of a large-scale phishing campaign that’s designed to deliver a known malware called…
Read More » - SECURITY
France trains troops in Ukrainian-inspired drone tactics
French paratroopers are advancing their tactical drone capabilities, incorporating lessons learned from Ukraine’s battlefield use of First-Person View (FPV) drones…
Read More » - SECURITY
Netanyahu’s survival tactics tested amid Israel Shin Bet head’s accusations | Politics News
Israeli Prime Minister Benjamin Netanyahu has a knack for survival. The country’s longest serving leader – he has been in…
Read More » - GAMING
Star Wars: Zero Company Caters To Hardcore Fans, Despite Being An Approachable Tactics Game
Star Wars video games have primarily focused on action for several years now, but Star Wars: Zero Company breaks from…
Read More » - GAMING
Star Wars: Zero Company Reveal Trailer Teases Stealthy Tactics In A Galaxy Far, Far Away
After being teased earlier this week, Star Wars: Zero Company was officially revealed at Star Wars Celebration Japan on Saturday.…
Read More » - APPLICATIONS
Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that…
Read More » - REVIEWS
“The girl should be calling men.” Leak exposes Black Basta’s influence tactics.
A leak of 190,000 chat messages traded among members of the Black Basta ransomware group shows that it’s a highly…
Read More » - APPLICATIONS
AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar
Apr 03, 2025The Hacker News The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But…
Read More » - APPLICATIONS
Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
Mar 31, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting,…
Read More »