Tag: Threat Bounty Program

BlackByte Ransomware Detection: New Go-Based Variants With Enhanced File Encryption Continue Breaching Organizations and Demand Ransom 4 min read Latest Threats BlackByte Ransomware Detection: New Go-Based Variants With Enhanced File Encryption Continue Breaching Organizations and Demand Ransom by Veronika Telychko Detect AvosLocker Ransomware: Abuses a Driver File to Disable Anti-Virus Protection, Scans for Log4Shell Vulnerability 4 min read Latest Threats Detect AvosLocker Ransomware: Abuses a Driver File to Disable Anti-Virus Protection, Scans for Log4Shell Vulnerability by Anastasiia Yevdokimova Novel BEATDROP and BOOMMIC Malware Families Used by APT29: Phishing Campaigns with HTML Smuggling Techniques, Long-Term Access for Espionage Purposes 3 min read Latest Threats Novel BEATDROP and BOOMMIC Malware Families Used by APT29: Phishing Campaigns with HTML Smuggling Techniques, Long-Term Access for Espionage Purposes by Anastasiia Yevdokimova TraderTraitor Malware Detection: CISA, FBI, and U.S. Treasury Department Warn of Cyber-Attacks by Lazarus APT 3 min read Latest Threats TraderTraitor Malware Detection: CISA, FBI, and U.S. Treasury Department Warn of Cyber-Attacks by Lazarus APT by Anastasiia Yevdokimova Inno Stealer Detection: New Infostealer Disguised as OS Update 3 min read Latest Threats Inno Stealer Detection: New Infostealer Disguised as OS Update by Anastasiia Yevdokimova Lazarus Targets Chemical Sector and IT Industry of South Korea: Sigma-Based Detection Content 4 min read Latest Threats Lazarus Targets Chemical Sector and IT Industry of South Korea: Sigma-Based Detection Content by Anastasiia Yevdokimova Pipedream/INCONTROLLER Detection: New Attack Framework and Tools Target Industrial Control Systems 4 min read Latest Threats Pipedream/INCONTROLLER Detection: New Attack Framework and Tools Target Industrial Control Systems by Anastasiia Yevdokimova SOC Prime Threat Bounty — March 2022 Results 4 min read SOC Prime Threat Bounty — March 2022 Results by Alla Yurchenko Parrot Traffic Direction System (TDS) Attacks 3 min read Latest Threats Parrot Traffic Direction System (TDS) Attacks by Anastasiia Yevdokimova Tarrask Malware Detection: Defense Evasion Tool to Abuse Scheduled Tasks 3 min read Latest Threats Tarrask Malware Detection: Defense Evasion Tool to Abuse Scheduled Tasks by Anastasiia Yevdokimova