{
	"id": "a7b9722d-fd91-4625-984d-468a0b9cdddc",
	"created_at": "2026-04-06T00:08:42.038594Z",
	"updated_at": "2026-04-10T03:27:57.379221Z",
	"deleted_at": null,
	"sha1_hash": "09b90c77a25b60c3bac4a8d1f142ae721bc1bed4",
	"title": "Stay informed with cybersecurity videos",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 370071,
	"plain_text": "Stay informed with cybersecurity videos\r\nArchived: 2026-04-05 19:59:09 UTC\r\nVideo\r\nThis month in security with Tony Anscombe – March 2026 edition\r\nVideo\r\nThis month in security with Tony Anscombe – March 2026 edition\r\nThe past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization\r\nneeds a well-thought-out cyber-resilience plan\r\nEditor • 31 Mar 2026\r\nVideo\r\nRSAC 2026 wrap-up – Week in security with Tony Anscombe\r\nVideo\r\nhttps://www.welivesecurity.com/videos/xenomorph-what-know-android-banking-trojan/\r\nPage 1 of 5\n\nRSAC 2026 wrap-up – Week in security with Tony Anscombe\r\nThis year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many\r\norganizations haven't caught up with\r\nEditor • 27 Mar 2026\r\nVideo\r\nThis month in security with Tony Anscombe – February 2026 edition\r\nVideo\r\nThis month in security with Tony Anscombe – February 2026 edition\r\nIn this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication,\r\nunmanaged exposure, and popular AI tools\r\nEditor • 28 Feb 2026\r\nVideo\r\nThis month in security with Tony Anscombe – January 2026 edition\r\nVideo\r\nhttps://www.welivesecurity.com/videos/xenomorph-what-know-android-banking-trojan/\r\nPage 2 of 5\n\nThis month in security with Tony Anscombe – January 2026 edition\r\nThe trends from January offer useful clues about the risks and priorities that security teams are likely to contend\r\nwith throughout the year\r\nEditor • 30 Jan 2026\r\nVideo\r\nThis month in security with Tony Anscombe – December 2025 edition\r\nVideo\r\nThis month in security with Tony Anscombe – December 2025 edition\r\nAs 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across\r\nthe whole of this year\r\nEditor • 29 Dec 2025\r\nVideo\r\nThis month in security with Tony Anscombe – November 2025 edition\r\nVideo\r\nhttps://www.welivesecurity.com/videos/xenomorph-what-know-android-banking-trojan/\r\nPage 3 of 5\n\nThis month in security with Tony Anscombe – November 2025 edition\r\nData exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware\r\nfamilies, and more of this month's cybersecurity news\r\nEditor • 28 Nov 2025\r\nVideo\r\nThe who, where, and how of APT attacks in Q2 2025–Q3 2025\r\nVideo\r\nThe who, where, and how of APT attacks in Q2 2025–Q3 2025\r\nESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the\r\nESET APT Activity Report\r\nEditor • 07 Nov 2025\r\nVideo\r\nHow social engineering works | Unlocked 403 cybersecurity podcast (S2E6)\r\nVideo\r\nhttps://www.welivesecurity.com/videos/xenomorph-what-know-android-banking-trojan/\r\nPage 4 of 5\n\nHow social engineering works | Unlocked 403 cybersecurity podcast (S2E6)\r\nThink you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to\r\ndeceive you – and what you can do to stay one step ahead\r\nEditor • 04 Nov 2025\r\nVideo\r\nThis month in security with Tony Anscombe – October 2025 edition\r\nVideo\r\nThis month in security with Tony Anscombe – October 2025 edition\r\nFrom the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's\r\nheadlines offer a glimpse of what's shaping cybersecurity right now\r\nEditor • 31 Oct 2025\r\nSource: https://www.welivesecurity.com/videos/xenomorph-what-know-android-banking-trojan/\r\nhttps://www.welivesecurity.com/videos/xenomorph-what-know-android-banking-trojan/\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.welivesecurity.com/videos/xenomorph-what-know-android-banking-trojan/"
	],
	"report_names": [
		"xenomorph-what-know-android-banking-trojan"
	],
	"threat_actors": [
		{
			"id": "8c8fea8c-c957-4618-99ee-1e188f073a0e",
			"created_at": "2024-02-02T02:00:04.086766Z",
			"updated_at": "2026-04-10T02:00:03.563647Z",
			"deleted_at": null,
			"main_name": "Storm-1567",
			"aliases": [
				"Akira",
				"PUNK SPIDER",
				"GOLD SAHARA"
			],
			"source_name": "MISPGALAXY:Storm-1567",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "910b38e9-07fe-4b47-9cf4-e190a07b1b84",
			"created_at": "2024-04-24T02:00:49.516358Z",
			"updated_at": "2026-04-10T02:00:05.309426Z",
			"deleted_at": null,
			"main_name": "Akira",
			"aliases": [
				"Akira",
				"GOLD SAHARA",
				"PUNK SPIDER",
				"Howling Scorpius"
			],
			"source_name": "MITRE:Akira",
			"tools": [
				"Mimikatz",
				"PsExec",
				"AdFind",
				"Akira _v2",
				"Akira",
				"Megazord",
				"LaZagne",
				"Rclone"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434122,
	"ts_updated_at": 1775791677,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/09b90c77a25b60c3bac4a8d1f142ae721bc1bed4.pdf",
		"text": "https://archive.orkl.eu/09b90c77a25b60c3bac4a8d1f142ae721bc1bed4.txt",
		"img": "https://archive.orkl.eu/09b90c77a25b60c3bac4a8d1f142ae721bc1bed4.jpg"
	}
}