Tag: Detection Content

Volcano Demon Ransomware Attack Detection: Adversaries Apply a New LukaLocker Malware Demanding Ransom via Phone Calls 3 min read Latest Threats Volcano Demon Ransomware Attack Detection: Adversaries Apply a New LukaLocker Malware Demanding Ransom via Phone Calls by Daryna Olyniychuk Kimsuky APT Attack Detection: North Korean Hackers Abuse the TRANSLATEXT Chrome Extension to Steal Sensitive Data 3 min read Latest Threats Kimsuky APT Attack Detection: North Korean Hackers Abuse the TRANSLATEXT Chrome Extension to Steal Sensitive Data by Veronika Telychko CVE-2024-5806 Detection: A New Authentication Bypass Vulnerability in Progress MOVEit Transfer Under Active Exploitation 3 min read Latest Threats CVE-2024-5806 Detection: A New Authentication Bypass Vulnerability in Progress MOVEit Transfer Under Active Exploitation by Veronika Telychko GrimResource Attack Detection: A New Infection Technique Abuses Microsoft Management Console to Gain Full Code Execution 3 min read Latest Threats GrimResource Attack Detection: A New Infection Technique Abuses Microsoft Management Console to Gain Full Code Execution by Veronika Telychko What Is Threat Intelligence? 9 min read SOC Prime Platform What Is Threat Intelligence? by Veronika Telychko Velvet Ant Activity Detection: China-Backed Cyber-Espionage Group Launches a Prolonged Attack Using Malware Deployed on the F5 BIG-IP Devices 3 min read Latest Threats Velvet Ant Activity Detection: China-Backed Cyber-Espionage Group Launches a Prolonged Attack Using Malware Deployed on the F5 BIG-IP Devices by Veronika Telychko The New Era of Threat Bounty Program 8 min read SOC Prime Platform The New Era of Threat Bounty Program by Alla Yurchenko TellYouThePass Ransomware Attack Detection: Hackers Exploit CVE-2024-4577 to Install Web Shells and Drop Malware  3 min read Latest Threats TellYouThePass Ransomware Attack Detection: Hackers Exploit CVE-2024-4577 to Install Web Shells and Drop Malware  by Veronika Telychko CVE-2024-4577 Detection: A New Easy-to-Exploit PHP Vulnerability Could Lead to RCE 3 min read Latest Threats CVE-2024-4577 Detection: A New Easy-to-Exploit PHP Vulnerability Could Lead to RCE by Veronika Telychko CVE-2024-29849 Detection: A Critical Auth Bypass In Veeam Backup Enterprise Manager 3 min read Latest Threats CVE-2024-29849 Detection: A Critical Auth Bypass In Veeam Backup Enterprise Manager by Daryna Olyniychuk