
Lyndon Sutherland
@really_LJS
Followers
198
Following
18
Media
5K
Statuses
6K
I'm a Cyber Threat Intel Analyst working for Wesfarmers. My tweets are my own and do not reflect the opinions of my employer.
Brisbane, Australia
Joined August 2016
Electron Application Attacks: No Vulnerability Required
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Hive0117 Continues Fileless Malware Delivery in Eastern Europe
ibm.com
Get an in-depth look at a phishing email campaign by Hive0117, likely a financially motivated cybercriminal group. IBM Security X-Force breaks down the analysis.
0
0
0
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware
ibm.com
Explore the in-depth analysis on how the TrickBot threat group uses template-based metaprogramming to unleash the Bazar malware.
0
0
0
Check out this article: Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: TrickBot Bolsters Layered Defenses to Prevent Injection Research
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: Cybersecurity Trends: IBM’s Predictions for 2022
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: The Best Threat Hunters Are Human
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: Call to Patch: Zero Day Discovered in Enterprise Help Desk Platform
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: A New Cybersecurity Executive Order Puts the Heat on Critical Infrastructure Suppliers
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: An Attack Against Time
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: Nobelium Espionage Campaign Persists, Service Providers in Crosshairs
ibm.com
Microsoft recently announced ongoing campaigns attributed to the Nobelium state-sponsored threat group. Read up on the latest developments.
0
0
0
Check out this article: X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments
ibm.com
From human error to a burgeoning dark web marketplace, see how cybercriminals are evolving their attacks on cloud environments. Get the latest from the 2021 X-Force Cloud Threat Landscape Report.
0
0
0
Check out this article: LockBit 2.0: Ransomware Attacks Surge After Successful Affiliate Recruitment
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0
Check out this article: Dissecting Sodinokibi Ransomware Attacks: Bringing Incident Response and Intelligence Together in the Fight
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
1
Check out this article: ITG18: Operational Security Errors Continue to Plague Sizable Iranian Threat Group
ibm.com
IBM Security X-Force threat intelligence researchers continue to track suspected Iranian threat group ITG18. Updated with new IOCs.
0
0
0
Check out this article: RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation
ibm.com
Leverage educational content like blogs, articles, videos, courses, reports and more, crafted by IBM experts, on emerging security and identity technologies.
0
0
0