Tag: APT

Chinese State-Sponsored Cyber Actor Detection: Joint Cybersecurity Advisory (CSA) AA23-144a Sheds Light on Stealty Activity by Volt Typhoon Targeting U.S. Critical Infrastructure 6 min read CVEs Chinese State-Sponsored Cyber Actor Detection: Joint Cybersecurity Advisory (CSA) AA23-144a Sheds Light on Stealty Activity by Volt Typhoon Targeting U.S. Critical Infrastructure by Daryna Olyniychuk Merdoor Malware Detection: Lancefly APT Uses a Stealthy Backdoor in Long-Running Attacks Against Organizations in South and Southeast Asia 4 min read CVEs Merdoor Malware Detection: Lancefly APT Uses a Stealthy Backdoor in Long-Running Attacks Against Organizations in South and Southeast Asia by Veronika Zahorulko WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat 3 min read CVEs WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat by Daryna Olyniychuk MQsTTang Backdoor Detection: New Custom Malware by Mustang Panda APT Actively Used in the Latest Campaign Against Government Entities   3 min read CVEs MQsTTang Backdoor Detection: New Custom Malware by Mustang Panda APT Actively Used in the Latest Campaign Against Government Entities   by Daryna Olyniychuk BlueNoroff Group Activity Detection: Threat Actors Apply Novel Methods to Bypass Windows Mark-of-the-Web (MoTW) Protection 4 min read CVEs BlueNoroff Group Activity Detection: Threat Actors Apply Novel Methods to Bypass Windows Mark-of-the-Web (MoTW) Protection by Veronika Zahorulko What is Ransomware Detection? How to Detect Ransomware 11 min read SIEM & EDR What is Ransomware Detection? How to Detect Ransomware by Karolina Koval MagicWeb Detection: NOBELIUM APT Uses Sophisticated Authentication Bypass 3 min read CVEs MagicWeb Detection: NOBELIUM APT Uses Sophisticated Authentication Bypass by Anastasiia Yevdokimova Armageddon APT aka UAC-0010 Uses GammaLoad and GammaSteel Malware in Targeted Cyber-Attacks on Ukraine 3 min read CVEs Armageddon APT aka UAC-0010 Uses GammaLoad and GammaSteel Malware in Targeted Cyber-Attacks on Ukraine by Veronika Zahorulko APT37 Detection: North Korean Hackers Distribute Konni RAT, Target Orgs in Czechia and Poland 2 min read CVEs APT37 Detection: North Korean Hackers Distribute Konni RAT, Target Orgs in Czechia and Poland by Anastasiia Yevdokimova PingPull Malware Detection: New Stealthy RAT Used by Gallium APT 3 min read CVEs PingPull Malware Detection: New Stealthy RAT Used by Gallium APT by Anastasiia Yevdokimova