On June 24th, 2024, the Wordfence Threat Intelligence Team became aware of a WordPress plugin, Social Warfare, that was infected with malware through...
Vous n'êtes pas connecté
Weekly Threat Intelligence Report Date: June 24, 2024 Prepared by: David Brunsdon, Threat Intelligence – Security Engineer, HYAS Malware developers will use all sorts of techniques to obfuscate their C2 location and keep security analysts from being able to understand…
On June 24th, 2024, the Wordfence Threat Intelligence Team became aware of a WordPress plugin, Social Warfare, that was infected with malware through...
Twilio says “threat actors were able to identify” phone numbers of people who use the two-factor app Authy. © 2024 TechCrunch. All rights...
By Can Kasapoğlu Part 1: Assessing the Russian Geopolitical Threat to NATO The Russian Military Is Prepared for a Long War Through his...
VANCOUVER, British Columbia — HYAS Infosec, the adversary infrastructure platform provider offering unparalleled protection and visibility...
Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef. This operation leverages the SugarGh0st RAT...
The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry Limited’s latest Global Threat Intelligence...
Cisco Talos recently discovered an ongoing campaign from SneakyChef, a newly discovered threat actor using SugarGh0st malware, as early as August...
Cybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan using a custom backdoor....
Created by John Tuckner and the team at automation and AI-powered workflow platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set...
Unfurling Hemlock is using a new method, referred to as a “malware cluster bomb,” which allows the threat actor to use one malware sample to...