Tracking Threat Actor IP Patterns Using Date and Time with Python

In the ever-evolving landscape of cybersecurity, threat actors frequently use rotating IP addresses to obscure…

Security Brief: Actor Uses Compromised Accounts, Customized Social Engineering to Target Transport and Logistics Firms with Malware

Category Details Threat Actors Not currently attributed to a specific threat actor. Infrastructure overlaps with…

NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities

Category Details Threat Actors Not specified. Campaign Overview Discovery of five Nvidia out-of-bounds access vulnerabilities…

Cybersecurity Awareness Month is Ending, but Holiday Threats Are Just Getting Started | Huntress

Learn why cybersecurity awareness should last all year round, and discover pro tips to keep…

Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files

  SectionDetailsThreat Actors- Midnight Blizzard (also known as APT29, UNC2452, Cozy Bear)- Attributed to the…

Silencing the EDR Silencers | Huntress

Discover how adversaries are using tools like EDRSilencer to tamper with EDR communications and learn…

Protect Yourself from Political Donation Scams | Huntress

Don’t let fraud disrupt your civic duty. Learn how to spot and avoid political donation…

Exposing the Danger Within: Hardcoded Cloud Credentials in Popular Mobile Apps

Examining the hidden risks posed to user privacy and security due to presence of hardcoded…

Ransomware: Threat Level Remains High in Third Quarter

Recently established RansomHub group overtakes LockBit to become most prolific ransomware operation. Read More

Inside Adversary-in-the-Middle Attacks | Huntress

Discover how Adversary-in-the-Middle attacks silently hijack your sessions, and learn how to spot and prevent…