Tag: Sigma

SOC Prime Threat Bounty —  April 2023 Results 4 min read SOC Prime Threat Bounty —  April 2023 Results by Alla Yurchenko CVE-2023-25717 Detection: New Malware Botnet AndoryuBot Exploits RCE Flaw in the Ruckus Wireless Admin Panel 3 min read CVEs CVE-2023-25717 Detection: New Malware Botnet AndoryuBot Exploits RCE Flaw in the Ruckus Wireless Admin Panel by Veronika Zahorulko Detecting Abused Legitimate Tools Applied by Hackers in the Human-Operated Ransomware Attacks 4 min read CVEs Detecting Abused Legitimate Tools Applied by Hackers in the Human-Operated Ransomware Attacks by Veronika Zahorulko SmokeLoader Malware Detection: UAC-0006 Group Reemerges to Launch Phishing Attacks Against Ukraine Using Financial Subject Lures 3 min read CVEs SmokeLoader Malware Detection: UAC-0006 Group Reemerges to Launch Phishing Attacks Against Ukraine Using Financial Subject Lures by Veronika Zahorulko ROKRAT Detection: Malware Adopts New Deployment Methods Relying on Large LNK Files 3 min read CVEs ROKRAT Detection: Malware Adopts New Deployment Methods Relying on Large LNK Files by Daryna Olyniychuk WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat 3 min read CVEs WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat by Daryna Olyniychuk APT28 aka UAC-0001 Group Leverages Phishing Emails Disguised As Instructions for OS Updates Targeting Ukrainian State Bodies 3 min read CVEs APT28 aka UAC-0001 Group Leverages Phishing Emails Disguised As Instructions for OS Updates Targeting Ukrainian State Bodies by Daryna Olyniychuk CVE-2023-27524 Detection: New Vulnerability Exposes Thousands of Apache Superset Servers to RCE Attacks 3 min read CVEs CVE-2023-27524 Detection: New Vulnerability Exposes Thousands of Apache Superset Servers to RCE Attacks by Veronika Zahorulko CVE-2023-27350 Exploit Detection: Critical PaperCut RCE Vulnerability Added to the CISA’s Known Exploited Vulnerabilities Catalog 3 min read CVEs CVE-2023-27350 Exploit Detection: Critical PaperCut RCE Vulnerability Added to the CISA’s Known Exploited Vulnerabilities Catalog by Daryna Olyniychuk Domino Malware Detection: Ex-Conti and FIN7 Threat Actors Collaborate to Spread a New Backdoor 4 min read CVEs Domino Malware Detection: Ex-Conti and FIN7 Threat Actors Collaborate to Spread a New Backdoor by Veronika Zahorulko