Tag: Threat Hunting Content

KNOTWEED Activity Detection: CVE-2022-22047 Vulnerability and Multiple Windows & Adobe Zero-Day Exploitation by the European Private-Sector Offensive Actor (PSOA) 4 min read Latest Threats KNOTWEED Activity Detection: CVE-2022-22047 Vulnerability and Multiple Windows & Adobe Zero-Day Exploitation by the European Private-Sector Offensive Actor (PSOA) by Veronika Telychko Spyware Group Candiru: Targets Journalists in the Middle East With DevilsTongue Malware 3 min read Latest Threats Spyware Group Candiru: Targets Journalists in the Middle East With DevilsTongue Malware by Anastasiia Yevdokimova Threat Bounty Program: First Steps to Monetizing Your Detection Engineering Skills 6 min read SOC Prime Platform Threat Bounty Program: First Steps to Monetizing Your Detection Engineering Skills by Alla Yurchenko 8220 Gang Crimeware Group: Infects Cloud Hosts and Operates a Botnet and PwnRig Cryptocurrency Miner 3 min read Latest Threats 8220 Gang Crimeware Group: Infects Cloud Hosts and Operates a Botnet and PwnRig Cryptocurrency Miner by Anastasiia Yevdokimova CloudMensis Detection: New Malware to Steal macOS Users’ Data 3 min read Latest Threats CloudMensis Detection: New Malware to Steal macOS Users’ Data by Anastasiia Yevdokimova BlackCat Ransomware Attacks: Threat Actors Use Brute Ratel and Cobalt Strike Beacons for Advanced Intrusions 4 min read Latest Threats BlackCat Ransomware Attacks: Threat Actors Use Brute Ratel and Cobalt Strike Beacons for Advanced Intrusions by Veronika Telychko H0lyGh0st Detection: New Ransomware Tied to North Korean APT 3 min read Latest Threats H0lyGh0st Detection: New Ransomware Tied to North Korean APT by Daryna Olyniychuk CVE-2022-32223 Detection: New Vulnerability in Node.js 2 min read Latest Threats CVE-2022-32223 Detection: New Vulnerability in Node.js by Anastasiia Yevdokimova SOC Prime Provides a Smoking Guns Sigma Rules List to Give Organizations a Competitive Advantage in Cyber War 6 min read SOC Prime Provides a Smoking Guns Sigma Rules List to Give Organizations a Competitive Advantage in Cyber War by Veronika Telychko XMRig Coin Miner: Adversaries Employ New Approaches to Illegal Crypto Mining 2 min read Latest Threats XMRig Coin Miner: Adversaries Employ New Approaches to Illegal Crypto Mining by Anastasiia Yevdokimova