Tag: Cyberattack

Konni Group Attack Detection: North Korean Hackers Leverage russian-Language Weaponized Word Document to Spread RAT Malware 3 min read Latest Threats Konni Group Attack Detection: North Korean Hackers Leverage russian-Language Weaponized Word Document to Spread RAT Malware by Veronika Telychko LockBit 3.0 Ransomware Attack Detection: CISA, FBI, and International Cyber Authorities Warn Defenders of CVE 2023-4966 Citrix Bleed Vulnerability Exploitation 3 min read Latest Threats LockBit 3.0 Ransomware Attack Detection: CISA, FBI, and International Cyber Authorities Warn Defenders of CVE 2023-4966 Citrix Bleed Vulnerability Exploitation by Veronika Telychko CVE-2023-37580 Detection: Four Hacking Groups Exploit a Zimbra Zero-Day Vulnerability Targeting State Bodies 4 min read Latest Threats CVE-2023-37580 Detection: Four Hacking Groups Exploit a Zimbra Zero-Day Vulnerability Targeting State Bodies by Veronika Telychko Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine 3 min read Latest Threats Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine by Veronika Telychko CVE-2023-47246 Detection: Lace Tempest Hackers Actively Exploit a Zero-Day Vulnerability in SysAid IT Software 3 min read Latest Threats CVE-2023-47246 Detection: Lace Tempest Hackers Actively Exploit a Zero-Day Vulnerability in SysAid IT Software by Veronika Telychko What Is Threat-Informed Defense? 5 min read SOC Prime Platform What Is Threat-Informed Defense? by Veronika Telychko CVE-2023-22518 Detection: Exploitation of a New Critical Vulnerability in Atlassian Confluence Leads to Cerber Ransomware Deployment  4 min read Latest Threats CVE-2023-22518 Detection: Exploitation of a New Critical Vulnerability in Atlassian Confluence Leads to Cerber Ransomware Deployment  by Veronika Telychko Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research 4 min read Latest Threats Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research by Veronika Telychko CVE-2023-20198 Detection: Cisco IOS XE Zero-Day Vulnerability Actively Exploited to Install Implants 4 min read Latest Threats CVE-2023-20198 Detection: Cisco IOS XE Zero-Day Vulnerability Actively Exploited to Install Implants by Veronika Telychko UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers  5 min read Latest Threats UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers  by Veronika Telychko