Tag: Threat Hunting Content

CVE-2022-31672 Detection: Pre-Authenticated Remote Code Execution Exploit Using Patched Vulnerabilities in VMware vRealize Operations Management Suite 4 min read Latest Threats CVE-2022-31672 Detection: Pre-Authenticated Remote Code Execution Exploit Using Patched Vulnerabilities in VMware vRealize Operations Management Suite by Veronika Telychko SolidBit Ransomware Detection: Novel Variant Targets Users of Popular Video Games and Social Media Platforms 4 min read Latest Threats SolidBit Ransomware Detection: Novel Variant Targets Users of Popular Video Games and Social Media Platforms by Veronika Telychko Gwisin Detection: Threat Actors Spread Gwisin Ransomware Targeting Korean Companies 4 min read Latest Threats Gwisin Detection: Threat Actors Spread Gwisin Ransomware Targeting Korean Companies by Veronika Telychko CVE-2022-32548 Detection: Critical RCE Vulnerability Affects DrayTek’s Flagship Models 3 min read Latest Threats CVE-2022-32548 Detection: Critical RCE Vulnerability Affects DrayTek’s Flagship Models by Anastasiia Yevdokimova SmokeLoader Detection: Distributes Amadey Bot Malware via Software Cracks 4 min read Latest Threats SmokeLoader Detection: Distributes Amadey Bot Malware via Software Cracks by Veronika Telychko LockBit 3.0 Ransomware Attack Detection: Deploy Cobalt Strike Beacons Abusing Microsoft Defender 3 min read Latest Threats LockBit 3.0 Ransomware Attack Detection: Deploy Cobalt Strike Beacons Abusing Microsoft Defender by Daryna Olyniychuk KNOTWEED Activity Detection: CVE-2022-22047 Vulnerability and Multiple Windows & Adobe Zero-Day Exploitation by the European Private-Sector Offensive Actor (PSOA) 4 min read Latest Threats KNOTWEED Activity Detection: CVE-2022-22047 Vulnerability and Multiple Windows & Adobe Zero-Day Exploitation by the European Private-Sector Offensive Actor (PSOA) by Veronika Telychko Spyware Group Candiru: Targets Journalists in the Middle East With DevilsTongue Malware 3 min read Latest Threats Spyware Group Candiru: Targets Journalists in the Middle East With DevilsTongue Malware by Anastasiia Yevdokimova Threat Bounty Program: First Steps to Monetizing Your Detection Engineering Skills 6 min read SOC Prime Platform Threat Bounty Program: First Steps to Monetizing Your Detection Engineering Skills by Alla Yurchenko 8220 Gang Crimeware Group: Infects Cloud Hosts and Operates a Botnet and PwnRig Cryptocurrency Miner 3 min read Latest Threats 8220 Gang Crimeware Group: Infects Cloud Hosts and Operates a Botnet and PwnRig Cryptocurrency Miner by Anastasiia Yevdokimova