
vulns
Exploiting Zero-Days: APT34, APT28, and APT29 in Focus
Microsoft's January 2025 Patch Tuesday release addressed 159 vulnerabilities, including eight zero-day vulnerabilities, with three actively exploited in the wild.
vulns
Microsoft's January 2025 Patch Tuesday release addressed 159 vulnerabilities, including eight zero-day vulnerabilities, with three actively exploited in the wild.
ransomware
The 'Space Bears' threat actor is a relatively new ransomware group that emerged in April 2024. They are known for their corporate-themed data leak site and strategic affiliations, particularly with the Phobos ransomware-as-a-service group.
playfulghost
PLAYFULGHOST is a newly identified malware that has been observed targeting users through phishing emails and SEO poisoning. This malware is notable for its extensive capabilities, which include keylogging, screen and audio capture, remote shell access, and information stealing.
REF5961
The REF5961 intrusion set represents a sophisticated cyber-espionage campaign primarily targeting ASEAN (Association of Southeast Asian Nations) members and Mongolian government infrastructure.
hellcat
The Hellcat ransomware group, which emerged in late 2024, has rapidly become a significant player in the global cyber threat landscape. Known for its aggressive targeting, double-extortion tactics, and unique communication style, Hellcat has already...
threat-actors
Threat actors increasingly leveraged advanced technologies such as artificial intelligence (AI) and machine learning to enhance their attacks.
ransomware
The threat actors "Lynx" and "Cicada3301" have been active in recent cyber campaigns, employing sophisticated tactics, techniques, and procedures (TTPs) to target various sectors. Lynx, a rebranding of the INC ransomware, has been particularly active in ..
apt
Russia targets these institutions due to geopolitical tensions, employing tactics like spear-phishing, ransomware, and supply chain attacks. China focuses on cyber espionage, aiming to steal intellectual property and research data through advanced persistent threats and credential harvesting.
vendors
Vendor management programs are essential for organizations to manage risks associated with third-party vendors. These programs typically include components such as security questionnaires, contract language...
breaches
This report identifies the top 5 most impactful incidents: the LoanDepot ransomware attack, the Snowflake data breach, the CDK Global ransomware attack, the Change Healthcare ransomware attack, and the Volt Typhoon infiltration of US critical infrastructure.
badbox
BADBOX, a sophisticated malware operation originating from China, was preloaded on over 30,000 internet-connected devices, including digital picture frames, media players, and low-cost Android devices.
vulnerabilities
These vulnerabilities include remote code execution (RCE) flaws in Windows components such as Hyper-V, Remote Desktop Services, and the Local Security Authority Subsystem Service (LSASS)