-
Payload Trends in Malicious OneNote Samples
Source: Unit 42 Published on 2024-05-16 By Ashkan Hosseini and Ashutosh Chitwadgi
-
Leveraging DNS Tunneling for Tracking and Scanning
Source: Unit 42 Published on 2024-05-13 By Shu Wang, Ruian Duan and Daiping Liu
-
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400
Source: Unit 42 Published on 2024-04-13 By Unit 42
-
Muddled Libra’s Evolution to the Cloud
Source: Unit 42 Published on 2024-04-10 By Margaret Zimmermann
-
It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise
Source: Unit 42 Published on 2024-04-09 By Beliz Kaleli, Fang Liu, Peng Peng, Alex Starov, Joey Allen and Stefan Springer
-
Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management
Source: Blog from Microsoft Security Published on 2024-05-14 By Rob Lefferts
-
How implementing a trust fabric strengthens identity and network
Source: Blog from Microsoft Security Published on 2024-05-09 By Joy Chik
-
Microsoft announces the 2024 Microsoft Security Excellence Awards winners
Source: Blog from Microsoft Security Published on 2024-05-08 By Maria Thomson
-
New capabilities to help you secure your AI transformation
Source: Blog from Microsoft Security Published on 2024-05-07 By Vasu Jakkal
-
Security above all else—expanding Microsoft’s Secure Future Initiative
Source: Blog from Microsoft Security Published on 2024-05-03 By Charlie Bell
-
Ransomware gang targets Windows admins via PuTTy, WinSCP malvertising
Source: BleepingComputer Published on 2024-05-19 By Lawrence Abrams
-
Banking malware Grandoreiro returns after police disruption
Source: BleepingComputer Published on 2024-05-18 By Bill Toulas
-
The Week in Ransomware - May 17th 2024 - Mailbombing is back
Source: BleepingComputer Published on 2024-05-18 By Lawrence Abrams
-
Microsoft to start enforcing Azure multi-factor authentication in July
Source: BleepingComputer Published on 2024-05-18 By Sergiu Gatlan
-
SEC: Financial orgs have 30 days to send data breach notifications
Source: BleepingComputer Published on 2024-05-18 By Bill Toulas
-
QakBot attacks with Windows zero-day (CVE-2024-30051)
Source: Securelist Published on 2024-05-15 By Boris Larin, Mert Degirmenci
-
Incident response analyst report 2023
Source: Securelist Published on 2024-05-14 By Kaspersky GERT, Kaspersky Security Services
-
APT trends report Q1 2024
Source: Securelist Published on 2024-05-09 By GReAT
-
State of ransomware in 2024
Source: Securelist Published on 2024-05-08 By Kaspersky
-
Exploits and vulnerabilities in Q1 2024
Source: Securelist Published on 2024-05-07 By Alexander Kolesnikov, Vitaly Morgunov
-
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
Source: The Hacker News Published on 2024-05-18
-
New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs
Source: The Hacker News Published on 2024-05-17
-
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Source: The Hacker News Published on 2024-05-17
-
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
Source: The Hacker News Published on 2024-05-17
-
CISA Warns of Actively Exploited D-Link Router Vulnerabilities - Patch Now
Source: The Hacker News Published on 2024-05-17
-
From IcedID to Dagon Locker Ransomware in 29 Days
Source: The DFIR Report Published on 2024-04-29 By editor
-
From OneNote to RansomNote: An Ice Cold Intrusion
Source: The DFIR Report Published on 2024-04-01 By editor
-
Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE
Source: The DFIR Report Published on 2024-03-04 By editor
-
SEO Poisoning to Domain Control: The Gootloader Saga Continues
Source: The DFIR Report Published on 2024-02-26 By editor
-
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Source: The DFIR Report Published on 2024-01-29 By editor