dprk
Lazarus Group's Cryptocurrency Heists: Bybit, BingX, and Phemex Under Siege
The Lazarus Group has intensified its focus on cryptocurrency exchanges, executing high-profile hacks on Bybit...
dprk
The Lazarus Group has intensified its focus on cryptocurrency exchanges, executing high-profile hacks on Bybit...
socgholish
The detection of SocGholish malware has advanced through techniques like behavioral analysis, signature-based detection, and anomaly detection. These methods are crucial due to the malware's ability to change its code and employ unique delivery methods.
mustang-panda
Mustang Panda, a China-based cyber espionage group, is exploiting a newly discovered Windows zero-day vulnerability to gain unauthorized access to systems. This vulnerability allows the group to execute malicious code...
silver fox
The SilverFox APT group is a sophisticated cyber threat actor known for its espionage and cybercrime campaigns, primarily targeting Chinese-speaking individuals and organizations.
ato
Account Takeover (ATO) attacks pose significant threats across various sectors, leading to financial loss, data breaches, and reputational damage.
carbanak
Carbanak emerged in 2013, attributed to the Eastern European cybercrime group known as the Carbanak Group or Anunak. This malware family primarily targets financial institutions, driven by the motivation of financial gain.
deepfake
The rise of deepfake technology has necessitated the development of advanced detection tools to combat phishing attacks. Tools like Reality Defender are being utilized to train employees through deepfake phishing drills, enhancing their ability to recognize manipulated content.
ransomware
Interlock Ransomware is an emerging and sophisticated threat that has been increasingly targeting healthcare organizations. This ransomware employs advanced techniques such as phishing, fake software updates, and malicious websites to gain initial access.
rid-hijack
RID (Relative Identifier) hijacking is a sophisticated post-exploitation technique used by attackers to escalate privileges on compromised Windows systems.
browser
Malicious browser extensions have long been a significant threat, exploiting the widespread use of web browsers to steal data, inject ads, hijack browser settings, and install additional malware...
ai
The effectiveness of AI-enabled cybersecurity services in detecting and responding to advanced persistent threats (APTs) is a critical area of focus for organizations aiming to bolster their defenses against sophisticated cyber-attacks.
vulns
Microsoft's January 2025 Patch Tuesday release addressed 159 vulnerabilities, including eight zero-day vulnerabilities, with three actively exploited in the wild.