Cybersecurity | Data Exfiltration | Healthcare | Healthcare Security | Ransomware KillSec ransomware targeting healthcare IT systems
Cybersecurity Threats | Espionage Techniques | Malware Frameworks Chinese APT group infiltrated Philippine military with EggStreme fileless malware
Cybersecurity Threats | Data Exfiltration | Malware Techniques Russian cyberespionage group APT28 targets NATO member firms with Outlook “NotDoor” backdoor
Cloud Security Vulnerabilities | Cybersecurity Threats | Ransomware Tactics Storm-0501 utilizes Entra ID to extract and erase Azure data during hybrid cloud attacks
Command-and-Control | Data Exfiltration | Energy | Government Entities | manufacturing | Retail | ShadowSilk | Spear Phishing | SturgeonPhisher | Web Shells | YoroTrooper ShadowSilk attacks Asia-Pacific government targets via Telegram bots
Log Collection Failures | Misconfigured Detection Rules | Threat Detection Gaps Reasons Behind SIEM Rule Failures and Solutions: Lessons Learned from 160 Million Attack Simulations
S3 Access Control Mechanisms | Security Best Practices | Trusted Advisor Limitations AWS Trusted Advisor vulnerability hides public S3 buckets
Cybersecurity Threats | Malware Development | Phishing Attacks Noodlophile malware operation using copyright-related phishing tactics
Collaborative Threat Actors | Cybercriminal Tactics | Data Breaches How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands
Cybercrime | Data Breach | Tax Fraud A hacker has been extradited to the United States for his involvement in tax fraud schemes that resulted in the theft of more than $2.5 million.
Cybersecurity Threats | Global Espionage | Malware Techniques Advanced DevilsTongue Windows spyware monitors users around the world.
Attack Techniques | Ransomware Operations | Targeted Industries Akira and Lynx ransomware are targeting Managed Service Providers (MSPs) by exploiting stolen login credentials and existing vulnerabilities.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cybercrime | Data Exfiltration | Malware Distribution Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.
Cybersecurity Threats | Malware Delivery Techniques | Remote Access Tools A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.
CL-STA-0969 Deploys Hidden Malware in Telecommunications Infrastructures Throughout a 10-Month Intelligence Gathering Operation.