Tag: Sigma

CVE-2025-21298 Detection: Critical Zero-Click OLE Vulnerability in Microsoft Outlook Results in Remote Code Execution  3 min read Latest Threats CVE-2025-21298 Detection: Critical Zero-Click OLE Vulnerability in Microsoft Outlook Results in Remote Code Execution  by Daryna Olyniychuk Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks  4 min read Latest Threats Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks  by Veronika Telychko CVE-2024-49113 Detection: Windows LDAP Denial-of-Service Vulnerability aka LDAPNightmare Exploited via a Publicly Available PoC 4 min read Latest Threats CVE-2024-49113 Detection: Windows LDAP Denial-of-Service Vulnerability aka LDAPNightmare Exploited via a Publicly Available PoC by Veronika Telychko Detect Banshee Stealer: Stealthy Apple macOS Malware Evades Detection Using XProtect Encryption 4 min read Latest Threats Detect Banshee Stealer: Stealthy Apple macOS Malware Evades Detection Using XProtect Encryption by Daryna Olyniychuk NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System 4 min read Latest Threats NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System by Veronika Telychko CVE-2024-49112 Detection: Zero-Click PoC Exploit for a Critical LDAP RCE Vulnerability Can Crush Unpatched Windows Servers 3 min read Latest Threats CVE-2024-49112 Detection: Zero-Click PoC Exploit for a Critical LDAP RCE Vulnerability Can Crush Unpatched Windows Servers by Daryna Olyniychuk Strela Stealer Attack Detection: New Malware Variant Now Targets Ukraine Alongside Spain, Italy, and Germany 3 min read Latest Threats Strela Stealer Attack Detection: New Malware Variant Now Targets Ukraine Alongside Spain, Italy, and Germany by Veronika Telychko UAC-0125 Attack Detection: Hackers Use Fake Websites on Cloudflare Workers to Exploit the “Army+” Application 4 min read Latest Threats UAC-0125 Attack Detection: Hackers Use Fake Websites on Cloudflare Workers to Exploit the “Army+” Application by Veronika Telychko DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution 3 min read Latest Threats DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution by Veronika Telychko UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware 3 min read Latest Threats UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware by Veronika Telychko