Tag: Threat Hunting Content

China-Backed APT Attack Detection: Withstanding the Escalating Sophistication & Maturity of Chinese State-Sponsored Offensive Operations Based on the Recorded Future’s Insikt Group Research 5 min read Latest Threats China-Backed APT Attack Detection: Withstanding the Escalating Sophistication & Maturity of Chinese State-Sponsored Offensive Operations Based on the Recorded Future’s Insikt Group Research by Daryna Olyniychuk CVE-2023-22518 Detection: Exploitation of a New Critical Vulnerability in Atlassian Confluence Leads to Cerber Ransomware Deployment  4 min read Latest Threats CVE-2023-22518 Detection: Exploitation of a New Critical Vulnerability in Atlassian Confluence Leads to Cerber Ransomware Deployment  by Veronika Telychko CVE-2023-43208 Detection: NextGen’s Mirth Connect RCE Vulnerability Exposes Healthcare Data to Risks 2 min read Latest Threats CVE-2023-43208 Detection: NextGen’s Mirth Connect RCE Vulnerability Exposes Healthcare Data to Risks by Veronika Telychko Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research 4 min read Latest Threats Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research by Veronika Telychko CVE-2023-4966 Detection: Critical Citrix NetScaler Vulnerability Actively Exploited In the Wild 3 min read Latest Threats CVE-2023-4966 Detection: Critical Citrix NetScaler Vulnerability Actively Exploited In the Wild by Daryna Olyniychuk GraphRunner Activity Detection: Hackers Apply a Post-Exploitation Toolset to Abuse Microsoft 365 Default Configurations 3 min read Latest Threats GraphRunner Activity Detection: Hackers Apply a Post-Exploitation Toolset to Abuse Microsoft 365 Default Configurations by Veronika Telychko CVE-2023-20198 Detection: Cisco IOS XE Zero-Day Vulnerability Actively Exploited to Install Implants 4 min read Latest Threats CVE-2023-20198 Detection: Cisco IOS XE Zero-Day Vulnerability Actively Exploited to Install Implants by Veronika Telychko UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers  5 min read Latest Threats UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers  by Veronika Telychko Balada Injector Malware Campaign Detection: Hackers Exploit a tagDiv Composer Vulnerability Infecting Thousands of WordPress Sites 4 min read Latest Threats Balada Injector Malware Campaign Detection: Hackers Exploit a tagDiv Composer Vulnerability Infecting Thousands of WordPress Sites by Veronika Telychko LostTrust Ransomware Detection: SFile and Mindware Advancement, Successor of MetaEncryptor Gang 3 min read Latest Threats LostTrust Ransomware Detection: SFile and Mindware Advancement, Successor of MetaEncryptor Gang by Veronika Telychko