New DCOM Attack Exploits Windows Installer for Backdoor Access
Attribute Details Threat Actors Not specified Campaign Overview Novel DCOM-based lateral movement attack for stealthily…
U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls
Attribute Details Threat Actors Guan Tianfeng (aka gbigmao, gxiaomao), Sichuan Silence Information Technology Company, Limited,…
Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE – Smishing Triad in Action
AttributeDetailsThreat ActorsOrganized crime groups, Smishing Triad, Chinese-speaking actors collaborating with individuals from Indonesia, Vietnam, and…
Multiple Cleo file transfer products being exploited by hackers
Attribute Details Threat Actors Termite ransomware group, unidentified hackers exploiting Cleo vulnerabilities Campaign Overview Active…
RedLine, A License to Steal: The Rudometov Story & Operation Magnus
AttributeDetailsThreat ActorsMaxim Rudometov, RedLine developersCampaign OverviewDisruption of RedLine and Meta infostealers by Operation Magnus, collaboration…
Black Basta Ransomware Uses MS Teams, Email Bombing to Spread Malware
Attribute Details Threat Actors Black Basta ransomware group (aka UNC4393) Campaign Overview Sophisticated social engineering…
US sanctions Chinese cyber firm for compromising ‘thousands’ of firewalls in 2020
Attribute Details Threat Actors Sichuan Silence Information Technology Company, Guan Tianfeng (aka GbigMao), linked to…
3AM Ransomware: What You Need To Know
Attribute Details Threat Actors 3AM ransomware group Campaign Overview Emerged in late 2023; exfiltrates, encrypts,…
Wyden seeks stricter telecom cyber standards following Salt Typhoon breach
Attribute Details Threat Actors Salt Typhoon, a Chinese hacking group Campaign Overview Long-term breach of…
BadRAM: $10 security flaw in AMD could allow hackers to access cloud computing secrets
Attribute Details Threat Actors Potential attackers requiring physical access; remote attackers exploiting unlocked SPD chips…