Threats
Review Current Cyber Threats & Learn How To Protect Computers, Servers & Cloud Workloads. Threat intelligence and news reporting on the latest cyber adversaries an their tools. Prevent Cyber Attacks. The latest malware and APT information.
-
The Evolution of Cyber Threats: A Deep Dive with Stanislav Kondrashov
The History of Cyber Threats: From Early Attacks to Modern Warfare The world of technology has rapidly evolved over the…
-
Forced Chrome extensions get removed, keep reappearing
Malwarebytes found a family of forced Chrome extensions that can’t be removed because of a policy change that tells users…
-
ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
A review of what’s changed in malware in 2022, and what hasn’t, based on Adam Kujawa’s talk at RSAC 2022.…
-
Credential-stealing malware disguises itself as Telegram, targets social media users
Spyware.FFDroider is an information stealer that exfiltrates browser data in an attempt to steal credentials and valid session cookies. A…
-
Don’t let scammers ruin your Valentine’s Day
No matter the occasion, you can always count on scammers to show up. Today is Valentine’s Day, so we thought…
-
SolarWinds attackers launch new campaign
The Microsoft Threat Intelligence Center has issued a warning about new activities from Nobelium, the group behind SolarWinds, Sunburst, and…
-
Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
Threat Research Blog Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise June 16, 2021 | by Tyler McLellan, Robert…
-
The UNC2529 Triple Double: A Trifecta Phishing Campaign
In December 2020, Mandiant observed a widespread, global phishing campaign targeting numerous organizations across an array of industries. Mandiant tracks…
-
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
Mandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being…
-
Abusing Replication: Stealing AD FS Secrets Over the Network
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching…
- 1
- 2