threat-actors
Evolution of Threat Actors in 2024 and Predictions for 2025
Threat actors increasingly leveraged advanced technologies such as artificial intelligence (AI) and machine learning to enhance their attacks.
threat-actors
Threat actors increasingly leveraged advanced technologies such as artificial intelligence (AI) and machine learning to enhance their attacks.
vulnerabilities
These vulnerabilities include remote code execution (RCE) flaws in Windows components such as Hyper-V, Remote Desktop Services, and the Local Security Authority Subsystem Service (LSASS)
threat-actors
CVE-2024-5910 presents a critical vulnerability within Palo Alto Networks' Expedition tool, arising from missing authentication on a vital function. This flaw opens the door for attackers with network access to seize control over admin accounts.
apt36
APT36, also known as Transparent Tribe, is a sophisticated advanced persistent threat (APT) group believed to be based in Pakistan. Over the past years, APT36 has been actively engaged in cyber-espionage campaigns primarily targeting Indian..
ai
While AI technologies like machine learning are indeed being incorporated into certain cyber attack methodologies, their impact is more nuanced than often portrayed.
threat-actors
The research highlights a growing trend of threat actors exploiting cloud services as entry points into networks. SCATTERED SPIDER, for instance, has been actively using social engineering to breach cloud systems, posing a significant threat to SaaS providers.
threat-actors
This group has been observed deploying various ransomware families and utilizing sophisticated techniques to evade detection and maximize their impact...
threat-actors
Onyx Sleet, also known by aliases such as Andariel, Plutonium, and Silent Chollima, is a North Korean cyber threat actor involved in cyber espionage and targeting critical sectors, including nuclear technology.
threat-actors
Storm-1811 is a sophisticated and financially motivated cybercriminal group known for its advanced techniques and targeted attacks, including the deployment of Black Basta ransomware..
threat-actors
SocGholish is a sophisticated malware family that has been active since at least April 2018. It is primarily known for its drive-by-download method, masquerading as software updates to trick users into..
threat-actors
This breach is significant due to TeamViewer's widespread use in remote access and management, making it a critical target for cyber threats. The breach has been attributed to APT29, a state-sponsored threat actor associated with...
research
Command and Control (C2) frameworks are critical tools used by both threat actors and cybersecurity professionals for managing compromised systems, conducting post-exploitation activities, and simulating adversary behavior..