
threat-actors
RESEARCH: Storm-1811
Storm-1811 is a sophisticated and financially motivated cybercriminal group known for its advanced techniques and targeted attacks, including the deployment of Black Basta ransomware..
threat-actors
Storm-1811 is a sophisticated and financially motivated cybercriminal group known for its advanced techniques and targeted attacks, including the deployment of Black Basta ransomware..
threat-actors
SocGholish is a sophisticated malware family that has been active since at least April 2018. It is primarily known for its drive-by-download method, masquerading as software updates to trick users into..
threat-actors
This breach is significant due to TeamViewer's widespread use in remote access and management, making it a critical target for cyber threats. The breach has been attributed to APT29, a state-sponsored threat actor associated with...
The Zergeca botnet is significant due to its sophisticated capabilities, which extend beyond typical Distributed Denial of Service (DDoS) attacks to include functionalities such as proxying, scanning, self-upgrading, file transfer, reverse shell, and collecting sensitive device information. This analysis is crucial for law enforcement and cybersecurity professionals to understand the
research
Command and Control (C2) frameworks are critical tools used by both threat actors and cybersecurity professionals for managing compromised systems, conducting post-exploitation activities, and simulating adversary behavior..
News
This is AlphaHunt, a brand new site by CSIRT Gadgets that's just getting started. Things will be up and running here shortly, but you can subscribe in the meantime if you'd like to stay up to date and receive emails when new content is published!