-
Oct 29, 2023
Microsoft has monitored the actions of a group named Octo Tempest (identified by Crowdstrike as Scattered Spider), which has targeted multiple firms to extort money. The cybercriminals, linked to the BlackCat group (ALPHV), use a range of methods to gain… read more »
-
Oct 20, 2023
What's the difference between IoA and IOC, and why is it crucial to incorporate them into a security strategy?… read more »
-
Oct 8, 2023
Ransomware groups are constantly evolving their tactics and techniques to stay ahead of defenders. … read more »
-
Oct 7, 2023
Personally, I am a big fan of NextDNS, a DNS service that (similar to PiHole) allows you to block traffic to advertising circuits, tracking and telemetry systems.… read more »
-
Sep 26, 2023
RansomedVC is a recent ransomware collective, which was initially detected by Malwarebytes and SocRadar in August 2023 after publishing information about nine victims on its dark web page:… read more »
-
Sep 24, 2023
Stealth Falcon APT (aka Project Raven or FruityArmor), a state-sponsored hacking group from the United Arab Emirates (UAE), is mainly known for targeting activists, journalists, and dissidents in the Middle East.… read more »
-
Sep 15, 2023
UNC3944, a financially motivated threat group, has been leveraging SMS phishing (smishing) campaigns to target organizations and gain unauthorized access to their systems. … read more »
-
Aug 29, 2023
Japan’s computer emergency response team (JPCERT) recently identified a new attack method named ‘MalDoc in PDF’, which manages to elude detection by incorporating a malicious Word file within a PDF file.… read more »