Gaming Engines: An Undetected Playground for Malware Loaders
Key Points/Topics Details Discovery Check Point Research uncovered a new technique using the Godot…
Ransomware-driven data exfiltration: techniques and implications
Category Details Threat Actors Ransomware and extortion groups, including lucrative intrusion sets and state-sponsored actors.…
RansomHub gang says it broke into networks of Texas city, Minneapolis agency
Key Detail Information Threat Actors RansomHub cybercriminal group, known for high-profile attacks in 2024. Campaign…
Analysis of Elpaco: a Mimic variant
Key Detail Information Threat Actors Unknown Campaign Overview Attackers accessed the victim’s server via RDP…
Retailers struggle after ransomware attack on supply chain tech provider Blue Yonder
Category Details Threat Actors Unknown (hackers have not identified themselves). Campaign Overview Ransomware attack disrupted…
China’s Salt Typhoon hackers target telecom firms in Southeast Asia with new malware
Category Details Threat Actors Salt Typhoon (also referred to as Earth Estrie by Trend Micro).…
Solving Complex Threats with Microsoft Copilot Integration for ThreatConnect
Category Details Challenge Investigating a sophisticated phishing campaign with limited clues and time constraints. Objectives…
25th November – Threat Intelligence Report
Threat IncidentDescription and ImpactHack on Library of Congress by foreign adversary- Targeted the Library of…
Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platform
CategoryDetailsThreat ActorsNot explicitly mentioned.Campaign OverviewResearch on vulnerabilities in the ClipSp driver, which implements client licensing…
Advanced threat predictions for 2025
Predicted ThreatDetails of the ThreatsHacktivist alliances to escalate in 2025- Hacktivist groups are forming alliances,…