Tag: Threat Bounty Program

SOC Prime Threat Bounty — September 2022 Results 3 min read SOC Prime Threat Bounty — September 2022 Results by Alla Yurchenko CVE-2022-40684 Detection: A Critical Fortinet Authentication Bypass Vulnerability Exploited in the Wild 3 min read Latest Threats CVE-2022-40684 Detection: A Critical Fortinet Authentication Bypass Vulnerability Exploited in the Wild by Veronika Telychko BlackByte Ransomware Detection: Threat Actors Exploit CVE-2019-16098 Vulnerability in RTCore64.sys Driver to Bypass EDR Protection 3 min read Latest Threats BlackByte Ransomware Detection: Threat Actors Exploit CVE-2019-16098 Vulnerability in RTCore64.sys Driver to Bypass EDR Protection by Veronika Telychko Cheerscrypt Ransomware Detection: China-Backed Hackers, Emperor Dragonfly aka Bronze Starlight, Are Behind Ongoing Cyber Attacks 3 min read Latest Threats Cheerscrypt Ransomware Detection: China-Backed Hackers, Emperor Dragonfly aka Bronze Starlight, Are Behind Ongoing Cyber Attacks by Veronika Telychko NullMixer Malware Detection: Hackers Spread a Dropper Using SEO to Deploy Multiple Trojans at Once 3 min read Latest Threats NullMixer Malware Detection: Hackers Spread a Dropper Using SEO to Deploy Multiple Trojans at Once by Veronika Telychko CVE-2022-35405 Detection: CISA Warns of Adversaries Leveraging ManageEngine RCE Flaw 2 min read Latest Threats CVE-2022-35405 Detection: CISA Warns of Adversaries Leveraging ManageEngine RCE Flaw by Anastasiia Yevdokimova Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control 2 min read Latest Threats Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control by Anastasiia Yevdokimova TeamTNT Hijacking Servers:  Criminal Gang Specializing in Attacking Cloud Environments is Back 2 min read Latest Threats TeamTNT Hijacking Servers: Criminal Gang Specializing in Attacking Cloud Environments is Back by Anastasiia Yevdokimova Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover 3 min read Latest Threats Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover by Anastasiia Yevdokimova What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010 12 min read SIEM & EDR What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010 by Karolina Koval