New DCOM Attack Exploits Windows Installer for Backdoor Access

Attribute Details Threat Actors Not specified Campaign Overview Novel DCOM-based lateral movement attack for stealthily…

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

Attribute Details Threat Actors Guan Tianfeng (aka gbigmao, gxiaomao), Sichuan Silence Information Technology Company, Limited,…

Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE – Smishing Triad in Action

AttributeDetailsThreat ActorsOrganized crime groups, Smishing Triad, Chinese-speaking actors collaborating with individuals from Indonesia, Vietnam, and…

Multiple Cleo file transfer products being exploited by hackers

Attribute Details Threat Actors Termite ransomware group, unidentified hackers exploiting Cleo vulnerabilities Campaign Overview Active…

RedLine, A License to Steal: The Rudometov Story & Operation Magnus

AttributeDetailsThreat ActorsMaxim Rudometov, RedLine developersCampaign OverviewDisruption of RedLine and Meta infostealers by Operation Magnus, collaboration…

Black Basta Ransomware Uses MS Teams, Email Bombing to Spread Malware

Attribute Details Threat Actors Black Basta ransomware group (aka UNC4393) Campaign Overview Sophisticated social engineering…

US sanctions Chinese cyber firm for compromising ‘thousands’ of firewalls in 2020

Attribute Details Threat Actors Sichuan Silence Information Technology Company, Guan Tianfeng (aka GbigMao), linked to…

3AM Ransomware: What You Need To Know

Attribute Details Threat Actors 3AM ransomware group Campaign Overview Emerged in late 2023; exfiltrates, encrypts,…

Wyden seeks stricter telecom cyber standards following Salt Typhoon breach

Attribute Details Threat Actors Salt Typhoon, a Chinese hacking group Campaign Overview Long-term breach of…

BadRAM: $10 security flaw in AMD could allow hackers to access cloud computing secrets

Attribute Details Threat Actors Potential attackers requiring physical access; remote attackers exploiting unlocked SPD chips…