Chinese hackers use new Cobalt Strike-like attack framework
Researchers have observed a new post-exploitation attack framework used in the wild, named Manjusaka, which can be deployed as an…
Researchers have observed a new post-exploitation attack framework used in the wild, named Manjusaka, which can be deployed as an…
Threat analysts have uncovered a new campaign attributed to APT37, a North Korean group of hackers, targeting high-value organizations in…
Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of…
A new Windows Search zero-day vulnerability can be used to automatically open a search window containing remotely-hosted malware executables simply by…
Threat analysts report the activity of the Russian state-sponsored threat group known as Gamaredon (Armageddon, Shuckworm), is still notably active…
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat […] The…
The Computer Emergency Response Team of Ukraine (CERT-UA) has spotted new phishing attempts attributed to the Russian threat group tracked…
Threat analysts have compiled a detailed technical report on FIN7 operations from late 2021 to early 2022, showing that the…
An ongoing Mustang Panda campaign that has started at least eight months ago has been uncovered by threat analysts who…
The Palestinian-aligned APT group tracked as TA402 (aka Molerats) was spotted using a new implant named 'NimbleMamba' in a cyber-espionage…