Advanced Persistent Threats
-
Threat Intelligence
Wiper, Disguised as Fake Ransomware, Targets Russian Orgs
Companies infected with purported ransomware may no longer have an option to pay a ransom. A new malicious program acts…
-
Threat Intelligence
Malware Authors Inadvertently Take Down Own Botnet
It’s not often that malware authors go through the effort of creating a malicious tool for assembling a botnet, only…
-
Threat Intelligence
Ransomware Professionalization Grows as RaaS Takes Hold
Ransomware groups are getting their acts together, growing in sophistication and business acumen while monetizing ransomware beyond encryption, including double…
-
Threat Intelligence
Infostealer Malware Market Booms, as MFA Fatigue Sets In
Malicious actors are finding success deploying information stealer (infostealer) malware, combining stolen credentials and social engineering to carry out high-profile…
-
Threat Intelligence
Cyberattack Shuts Down French Hospital
French Health Ministry authorities were forced to shut down operations and transfer critically ill patients following a weekend cyberattack on…
-
Threat Intelligence
Where Advanced Cyberttackers Are Heading Next: Disruptive Hits, New Tech
In November, Ukraine’s president revealed that the country’s IT defenses fended off more than 1,300 Russian cyberattacks, including attacks on…
-
Threat Intelligence
SiriusXM, MyHyundai Car Apps Showcase Next-Gen Car Hacking
At least three mobile apps tailored to allow drivers to remotely start or unlock their vehicles were found to have…
-
Threat Intelligence
SOC Turns to Homegrown Machine Learning to Catch Cyber-Intruders
Using an internally developed machine-learning model trained on log data, the information security team for a French bank found it…
-
Threat Intelligence
One Year After Log4Shell, Most Firms Are Still Exposed to Attack
The Log4j vulnerability continues to present a major threat to enterprise organizations one year after the Apache Software Foundation disclosed…
-
Threat Intelligence
Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines
An attacker submitting changes to an open source repository on GitHub could cause downstream software projects that include the latest…