Tag: Sigma

UAC-0180 Targets Defense Contractors in Ukraine Using GLUEEGG, DROPCLUE, and ATERA 3 min read CVEs UAC-0180 Targets Defense Contractors in Ukraine Using GLUEEGG, DROPCLUE, and ATERA by Daryna Olyniychuk SOC Prime Threat Bounty Digest — June 2024 Results 4 min read SOC Prime Platform SOC Prime Threat Bounty Digest — June 2024 Results by Alla Yurchenko DarkGate Malware Detection: Adversaries Exploit Microsoft Excel Files to Spread a Harmful Software Package 3 min read CVEs DarkGate Malware Detection: Adversaries Exploit Microsoft Excel Files to Spread a Harmful Software Package by Veronika Zahorulko Kimsuky APT Campaign Detection Targeting Japanese Organizations  3 min read CVEs Kimsuky APT Campaign Detection Targeting Japanese Organizations  by Veronika Zahorulko APT40 Attacks Detection: People’s Republic of China State-Sponsored Hackers Rapidly Exploit Newly Revealed Vulnerabilities for Cyber-Espionage 5 min read CVEs APT40 Attacks Detection: People’s Republic of China State-Sponsored Hackers Rapidly Exploit Newly Revealed Vulnerabilities for Cyber-Espionage by Daryna Olyniychuk Kimsuky APT Attack Detection: North Korean Hackers Abuse the TRANSLATEXT Chrome Extension to Steal Sensitive Data 3 min read CVEs Kimsuky APT Attack Detection: North Korean Hackers Abuse the TRANSLATEXT Chrome Extension to Steal Sensitive Data by Veronika Zahorulko CVE-2024-5806 Detection: A New Authentication Bypass Vulnerability in Progress MOVEit Transfer Under Active Exploitation 3 min read CVEs CVE-2024-5806 Detection: A New Authentication Bypass Vulnerability in Progress MOVEit Transfer Under Active Exploitation by Veronika Zahorulko GrimResource Attack Detection: A New Infection Technique Abuses Microsoft Management Console to Gain Full Code Execution 3 min read CVEs GrimResource Attack Detection: A New Infection Technique Abuses Microsoft Management Console to Gain Full Code Execution by Veronika Zahorulko What Is Threat Intelligence? 9 min read SOC Prime Platform What Is Threat Intelligence? by Veronika Zahorulko Velvet Ant Activity Detection: China-Backed Cyber-Espionage Group Launches a Prolonged Attack Using Malware Deployed on the F5 BIG-IP Devices 3 min read CVEs Velvet Ant Activity Detection: China-Backed Cyber-Espionage Group Launches a Prolonged Attack Using Malware Deployed on the F5 BIG-IP Devices by Veronika Zahorulko