Tag: Threat Bounty Program

SOC Prime Threat Bounty — July 2022 Results 4 min read SOC Prime Threat Bounty — July 2022 Results by Alla Yurchenko Detecting SEABORGIUM Campaigns: A Cyberespionage Group Targeting Governments, Military, and NGOs Across Europe 3 min read Latest Threats Detecting SEABORGIUM Campaigns: A Cyberespionage Group Targeting Governments, Military, and NGOs Across Europe by Daryna Olyniychuk Zeppelin Ransomware Detection: CISA and FBI Issue a Joint Advisory for Enhanced Protection Against RaaS Threats 4 min read Latest Threats Zeppelin Ransomware Detection: CISA and FBI Issue a Joint Advisory for Enhanced Protection Against RaaS Threats by Veronika Telychko BlueSky Ransomware Detection: Targets Windows Hosts and Leverages Multithreading for Faster Encryption 4 min read Latest Threats BlueSky Ransomware Detection: Targets Windows Hosts and Leverages Multithreading for Faster Encryption by Veronika Telychko Cuba Ransomware Detection: Tropical Scorpius Threat Actors Deploy Novel RAT Malware in Targeted Attacks 5 min read Latest Threats Cuba Ransomware Detection: Tropical Scorpius Threat Actors Deploy Novel RAT Malware in Targeted Attacks by Veronika Telychko SolidBit Ransomware Detection: Novel Variant Targets Users of Popular Video Games and Social Media Platforms 4 min read Latest Threats SolidBit Ransomware Detection: Novel Variant Targets Users of Popular Video Games and Social Media Platforms by Veronika Telychko Dark Utilities “C2aaS” Platform: Provides Adversaries With a Vast Array of C2 Capabilities 3 min read Latest Threats Dark Utilities “C2aaS” Platform: Provides Adversaries With a Vast Array of C2 Capabilities by Anastasiia Yevdokimova Manjusaka Offensive Framework Detection: New Malware Family Quickly Catapults Into Operation 3 min read Latest Threats Manjusaka Offensive Framework Detection: New Malware Family Quickly Catapults Into Operation by Anastasiia Yevdokimova SmokeLoader Detection: Distributes Amadey Bot Malware via Software Cracks 4 min read Latest Threats SmokeLoader Detection: Distributes Amadey Bot Malware via Software Cracks by Veronika Telychko Adversaries Hack Microsoft SQL Servers to Install Proxyware and Steal Bandwidth 2 min read Latest Threats Adversaries Hack Microsoft SQL Servers to Install Proxyware and Steal Bandwidth by Anastasiia Yevdokimova