14 min read
Sigma
What Are SIGMA Rules: Beginner’s Guide
2 min read
SOC Prime Threat Bounty — April 2022 Results
2 min read
CVEs
Saitama Backdoor Detection: APT34 Aims New Malware at Jordan’s Foreign Ministry
2 min read
CVEs
Armageddon APT Known As UAC-0010 Drops GammaLoad.PS1_v2 Espionage Malware in a New Phishing Campaign Against Ukraine
3 min read
CVEs
Nerbian RAT Detection: Novel Trojan That Leverages Covid-19 Lures to Target European Users
2 min read
CVEs
CVE-2022-26923 Detection: Active Directory Domain Privilege Escalation Vulnerability
3 min read
CVEs
NetDooka Malware Detection: NetDooka Enables Data Theft and Hijacking
3 min read
CVEs
BPFDoor Malware Detection: Evasive Surveillance Tool Used to Spy on Linux Devices
3 min read
CVEs
Jester Stealer Malware Detection: Phishing Attacks Spreading Info-Stealing Malware by the UAC-0104 Hacking Group
3 min read
CVEs
CVE-2022-1388 Detection: BIG-IP iControl REST Vulnerability