Details |
Website |
2023-06-06 |
18 |
|
|
UAC-0099 Activity Detection: Hackers Conduct Cyber-Espionage Operations Against Ukrainian State Bodies and Media Organizations - SOC Prime |
Details |
Website |
2023-05-30 |
112 |
|
|
Russia/Ukraine Update - May 2023 |
Details |
Website |
2023-05-25 |
17 |
|
|
Chinese State-Sponsored Cyber Actor Detection: Joint Cybersecurity Advisory (CSA) AA23-144a Sheds Light on Stealty Activity by Volt Typhoon Targeting U.S. Critical Infrastructure - SOC Prime |
Details |
Website |
2023-05-17 |
25 |
|
|
AndoryuBot's DDOS Rampage |
Details |
Website |
2023-05-09 |
19 |
|
|
Hunting Russian Intelligence “Snake” Malware | CISA |
Details |
Website |
2023-05-07 |
48 |
|
|
Incident Response Games — #1 EMOTET | Squiblydoo |
Details |
Website |
2023-05-03 |
15 |
|
|
WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat - SOC Prime |
Details |
Website |
2023-05-01 |
47 |
|
|
SeroXen RAT for sale |
Details |
Website |
2023-04-25 |
48 |
|
|
The Claws of Evilcode Gauntlet - XWorm RAT - Avira Blog |
Details |
Website |
2023-04-18 |
39 |
|
|
PrivateLoader. Analyzing the Malware Encryption and Decryption |
Details |
Website |
2023-04-10 |
86 |
|
|
Threat Actor Spotlight: RagnarLocker Ransomware |
Details |
Website |
2023-02-28 |
16 |
|
|
Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK – Sysdig |
Details |
Website |
2023-02-28 |
56 |
|
|
Anomali Cyber Watch: Newly-Discovered WinorDLL64 Backdoor Has Code Similarities with Lazarus GhostSecret, Atharvan Backdoor Can Be Restricted to Communicate on Certain Days |
Details |
Website |
2023-01-31 |
12 |
|
|
UAC-0082 (Sandworm APT Group) Targets Ukrainian National Information Agency “Ukrinform” in a Series of Cyber Attacks Leveraging Multiple Wiper Malware Strains - SOC Prime |
Details |
Website |
2023-01-10 |
40 |
|
|
Anomali Cyber Watch: Turla Re-Registered Andromeda Domains, SpyNote Is More Popular after the Source Code Publication, Typosquatted Site Used to Leak Company’s Data |
Details |
Website |
2022-12-22 |
65 |
|
|
An infostealer comes to town: Dissecting a highly evasive malware targeting Italy |
Details |
Website |
2022-11-16 |
132 |
|
|
Venus Ransomware | Zeoticus Spin-off Shows Sophistication Isn’t Necessary for Success |
Details |
Website |
2022-10-26 |
10 |
|
|
Threat Actors Target AWS EC2 Workloads to Steal Credentials |
Details |
Website |
2022-10-26 |
11 |
|
|
Threat Actors Target AWS EC2 Workloads to Steal Credentials |
Details |
Website |
2022-10-17 |
75 |
|
|
Advanced Persistent Threat (APT) Groups: Boogeyman or Well-Funded Cybercriminal? |
Details |
Website |
2022-09-27 |
21 |
|
|
Anomali Cyber Watch: Sandworm Uses HTML Smuggling and Commodity RATs, BlackCat Ransomware Adds New Features, Domain Shadowing Is Rarely Detected, and More |
Details |
Website |
2022-09-21 |
18 |
|
|
Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware |
Details |
Website |
2022-09-21 |
18 |
|
|
Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware |
Details |
Website |
2022-09-15 |
73 |
|
|
From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder |
Details |
Website |
2022-09-08 |
7 |
|
|
How Malicious Actors Abuse Native Linux Tools in Their Attacks |