Tag: Threat Detection Marketplace

Formbook and Snake Keylogger Information Stealers Massively Distributed Via Email Using RelicRace and RelicSource Malware 3 min read Latest Threats Formbook and Snake Keylogger Information Stealers Massively Distributed Via Email Using RelicRace and RelicSource Malware by Veronika Telychko Spyware Group Candiru: Targets Journalists in the Middle East With DevilsTongue Malware 3 min read Latest Threats Spyware Group Candiru: Targets Journalists in the Middle East With DevilsTongue Malware by Anastasiia Yevdokimova Detection as Code Benefits: On Embracing The Future of Cyber Defense to Fuel Your Next-Gen SOC 5 min read SOC Prime Platform Detection as Code Benefits: On Embracing The Future of Cyber Defense to Fuel Your Next-Gen SOC by Anastasiia Yevdokimova QakBot Detection: New Trojan Variant Picked Up New Tricks 3 min read Latest Threats QakBot Detection: New Trojan Variant Picked Up New Tricks by Anastasiia Yevdokimova 8220 Gang Crimeware Group: Infects Cloud Hosts and Operates a Botnet and PwnRig Cryptocurrency Miner 3 min read Latest Threats 8220 Gang Crimeware Group: Infects Cloud Hosts and Operates a Botnet and PwnRig Cryptocurrency Miner by Anastasiia Yevdokimova CloudMensis Detection: New Malware to Steal macOS Users’ Data 3 min read Latest Threats CloudMensis Detection: New Malware to Steal macOS Users’ Data by Anastasiia Yevdokimova AgentTesla Information-Stealing Malware Delivered in Cyber-Attacks on Ukrainian Government Entities 3 min read Latest Threats AgentTesla Information-Stealing Malware Delivered in Cyber-Attacks on Ukrainian Government Entities by Veronika Telychko CVE-2022-33891 Detection: New Apache Spark Shell Command Injection Vulnerability 4 min read Latest Threats CVE-2022-33891 Detection: New Apache Spark Shell Command Injection Vulnerability by Veronika Telychko SOC Prime Provides a Smoking Guns Sigma Rules List to Give Organizations a Competitive Advantage in Cyber War 6 min read SOC Prime Provides a Smoking Guns Sigma Rules List to Give Organizations a Competitive Advantage in Cyber War by Veronika Telychko XMRig Coin Miner: Adversaries Employ New Approaches to Illegal Crypto Mining 2 min read Latest Threats XMRig Coin Miner: Adversaries Employ New Approaches to Illegal Crypto Mining by Anastasiia Yevdokimova