Tag: Threat Hunting Content

Armageddon APT aka UAC-0010 Uses GammaLoad and GammaSteel Malware in Targeted Cyber-Attacks on Ukraine 3 min read Latest Threats Armageddon APT aka UAC-0010 Uses GammaLoad and GammaSteel Malware in Targeted Cyber-Attacks on Ukraine by Veronika Telychko CVE-2022-27925 Detection: Mass Exploitation of Remote Code Execution (RCE) Vulnerability in Zimbra Collaboration Suite 3 min read Latest Threats CVE-2022-27925 Detection: Mass Exploitation of Remote Code Execution (RCE) Vulnerability in Zimbra Collaboration Suite by Veronika Telychko CVE-2022-31672 Detection: Pre-Authenticated Remote Code Execution Exploit Using Patched Vulnerabilities in VMware vRealize Operations Management Suite 4 min read Latest Threats CVE-2022-31672 Detection: Pre-Authenticated Remote Code Execution Exploit Using Patched Vulnerabilities in VMware vRealize Operations Management Suite by Veronika Telychko Threat Hunting Maturity Model Explained With Examples 8 min read SIEM & EDR Threat Hunting Maturity Model Explained With Examples by Oleksandra Rumiantseva SolidBit Ransomware Detection: Novel Variant Targets Users of Popular Video Games and Social Media Platforms 4 min read Latest Threats SolidBit Ransomware Detection: Novel Variant Targets Users of Popular Video Games and Social Media Platforms by Veronika Telychko Gwisin Detection: Threat Actors Spread Gwisin Ransomware Targeting Korean Companies 4 min read Latest Threats Gwisin Detection: Threat Actors Spread Gwisin Ransomware Targeting Korean Companies by Veronika Telychko CVE-2022-32548 Detection: Critical RCE Vulnerability Affects DrayTek’s Flagship Models 3 min read Latest Threats CVE-2022-32548 Detection: Critical RCE Vulnerability Affects DrayTek’s Flagship Models by Anastasiia Yevdokimova SmokeLoader Detection: Distributes Amadey Bot Malware via Software Cracks 4 min read Latest Threats SmokeLoader Detection: Distributes Amadey Bot Malware via Software Cracks by Veronika Telychko LockBit 3.0 Ransomware Attack Detection: Deploy Cobalt Strike Beacons Abusing Microsoft Defender 3 min read Latest Threats LockBit 3.0 Ransomware Attack Detection: Deploy Cobalt Strike Beacons Abusing Microsoft Defender by Daryna Olyniychuk Threat Hunting Techniques, Tactics, and Methodologies: Your Step-by-Step Introduction 10 min read SIEM & EDR Threat Hunting Techniques, Tactics, and Methodologies: Your Step-by-Step Introduction by Oleksandra Rumiantseva