Tag: Cyberattack

CVE-2023-49103 Detection: A Critical Vulnerability in OwnCloud’s Graph API App Leveraged for in-the-Wild Attacks 3 min read Latest Threats CVE-2023-49103 Detection: A Critical Vulnerability in OwnCloud’s Graph API App Leveraged for in-the-Wild Attacks by Veronika Zahorulko Konni Group Attack Detection: North Korean Hackers Leverage russian-Language Weaponized Word Document to Spread RAT Malware 3 min read Latest Threats Konni Group Attack Detection: North Korean Hackers Leverage russian-Language Weaponized Word Document to Spread RAT Malware by Veronika Zahorulko LockBit 3.0 Ransomware Attack Detection: CISA, FBI, and International Cyber Authorities Warn Defenders of CVE 2023-4966 Citrix Bleed Vulnerability Exploitation 3 min read Latest Threats LockBit 3.0 Ransomware Attack Detection: CISA, FBI, and International Cyber Authorities Warn Defenders of CVE 2023-4966 Citrix Bleed Vulnerability Exploitation by Veronika Zahorulko CVE-2023-37580 Detection: Four Hacking Groups Exploit a Zimbra Zero-Day Vulnerability Targeting State Bodies 4 min read Latest Threats CVE-2023-37580 Detection: Four Hacking Groups Exploit a Zimbra Zero-Day Vulnerability Targeting State Bodies by Veronika Zahorulko Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine 3 min read Latest Threats Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine by Veronika Zahorulko CVE-2023-47246 Detection: Lace Tempest Hackers Actively Exploit a Zero-Day Vulnerability in SysAid IT Software 3 min read Latest Threats CVE-2023-47246 Detection: Lace Tempest Hackers Actively Exploit a Zero-Day Vulnerability in SysAid IT Software by Veronika Zahorulko CVE-2023-22518 Detection: Exploitation of a New Critical Vulnerability in Atlassian Confluence Leads to Cerber Ransomware Deployment  4 min read Latest Threats CVE-2023-22518 Detection: Exploitation of a New Critical Vulnerability in Atlassian Confluence Leads to Cerber Ransomware Deployment  by Veronika Zahorulko Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research 4 min read Latest Threats Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research by Veronika Zahorulko CVE-2023-20198 Detection: Cisco IOS XE Zero-Day Vulnerability Actively Exploited to Install Implants 4 min read Latest Threats CVE-2023-20198 Detection: Cisco IOS XE Zero-Day Vulnerability Actively Exploited to Install Implants by Veronika Zahorulko UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers  5 min read Latest Threats UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers  by Veronika Zahorulko