3 min read
CVEs
Kimsuky APT Campaign Detection Targeting Japanese Organizations
5 min read
CVEs
APT40 Attacks Detection: People’s Republic of China State-Sponsored Hackers Rapidly Exploit Newly Revealed Vulnerabilities for Cyber-Espionage
3 min read
CVEs
Volcano Demon Ransomware Attack Detection: Adversaries Apply a New LukaLocker Malware Demanding Ransom via Phone Calls
3 min read
CVEs
Kimsuky APT Attack Detection: North Korean Hackers Abuse the TRANSLATEXT Chrome Extension to Steal Sensitive Data
3 min read
CVEs
CVE-2024-5806 Detection: A New Authentication Bypass Vulnerability in Progress MOVEit Transfer Under Active Exploitation
3 min read
CVEs
GrimResource Attack Detection: A New Infection Technique Abuses Microsoft Management Console to Gain Full Code Execution
9 min read
SOC Prime Platform
What Is Threat Intelligence?
3 min read
CVEs
UNC3886: Novel China-Nexus Cyber-Espionage Threat Actor Exploits Fortinet & VMware Zero-Days, Custom Malware for Long-Term Spying
3 min read
CVEs
Velvet Ant Activity Detection: China-Backed Cyber-Espionage Group Launches a Prolonged Attack Using Malware Deployed on the F5 BIG-IP Devices
8 min read
SOC Prime Platform
The New Era of Threat Bounty Program