Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Threat Actors

Silver Fox APT: Merging Espionage and Cybercrime in the Digital Age 
Criminal Activities | Cyber Threat Actors | Nation-State Attacks 

Silver Fox APT: Merging Espionage and Cybercrime in the Digital Age 

Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.
Credential Harvesting  | Remote Access Tools  | Social Engineering

Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.

Trend Micro has released patches for vulnerabilities in Apex One that were being exploited in the wild.
Cybersecurity Vulnerabilities  | Software Patching  | Threat Actor Exploits

Trend Micro has released patches for vulnerabilities in Apex One that were being exploited in the wild.

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.
Firewall Exploitation  | Ransomware Attacks  | Zero-Day Vulnerabilities

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.

Malicious individuals are leveraging artificial intelligence to enhance their operations, speed up their attacks, and target autonomous AI systems.
Advanced Social Engineering Techniques  | AI-Enhanced Cyber Attacks | Generative AI in Malware Development

Malicious individuals are leveraging artificial intelligence to enhance their operations, speed up their attacks, and target autonomous AI systems.

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.
Cybersecurity Threats | Ransomware Attacks  | Vulnerability Exploitation

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.

A surge in exploitation efforts by threat actors can serve as a preliminary warning of emerging cyber vulnerabilities.
Attacker Methodologies  | Threat Detection | Vulnerability Management 

A surge in exploitation efforts by threat actors can serve as a preliminary warning of emerging cyber vulnerabilities.

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search