Tag: Threat Hunting Content

UAC-0180 Targets Defense Contractors in Ukraine Using GLUEEGG, DROPCLUE, and ATERA 3 min read Latest Threats UAC-0180 Targets Defense Contractors in Ukraine Using GLUEEGG, DROPCLUE, and ATERA by Daryna Olyniychuk Detect CVE-2024-38112 Exploitation by Void Banshee APT in Zero-Day Attacks Targeting Windows Users 4 min read Latest Threats Detect CVE-2024-38112 Exploitation by Void Banshee APT in Zero-Day Attacks Targeting Windows Users by Daryna Olyniychuk DarkGate Malware Detection: Adversaries Exploit Microsoft Excel Files to Spread a Harmful Software Package 3 min read Latest Threats DarkGate Malware Detection: Adversaries Exploit Microsoft Excel Files to Spread a Harmful Software Package by Veronika Telychko Kimsuky APT Campaign Detection Targeting Japanese Organizations  3 min read Latest Threats Kimsuky APT Campaign Detection Targeting Japanese Organizations  by Veronika Telychko APT40 Attacks Detection: People’s Republic of China State-Sponsored Hackers Rapidly Exploit Newly Revealed Vulnerabilities for Cyber-Espionage 5 min read Latest Threats APT40 Attacks Detection: People’s Republic of China State-Sponsored Hackers Rapidly Exploit Newly Revealed Vulnerabilities for Cyber-Espionage by Daryna Olyniychuk Volcano Demon Ransomware Attack Detection: Adversaries Apply a New LukaLocker Malware Demanding Ransom via Phone Calls 3 min read Latest Threats Volcano Demon Ransomware Attack Detection: Adversaries Apply a New LukaLocker Malware Demanding Ransom via Phone Calls by Daryna Olyniychuk Kimsuky APT Attack Detection: North Korean Hackers Abuse the TRANSLATEXT Chrome Extension to Steal Sensitive Data 3 min read Latest Threats Kimsuky APT Attack Detection: North Korean Hackers Abuse the TRANSLATEXT Chrome Extension to Steal Sensitive Data by Veronika Telychko CVE-2024-5806 Detection: A New Authentication Bypass Vulnerability in Progress MOVEit Transfer Under Active Exploitation 3 min read Latest Threats CVE-2024-5806 Detection: A New Authentication Bypass Vulnerability in Progress MOVEit Transfer Under Active Exploitation by Veronika Telychko GrimResource Attack Detection: A New Infection Technique Abuses Microsoft Management Console to Gain Full Code Execution 3 min read Latest Threats GrimResource Attack Detection: A New Infection Technique Abuses Microsoft Management Console to Gain Full Code Execution by Veronika Telychko What Is Threat Intelligence? 9 min read SOC Prime Platform What Is Threat Intelligence? by Veronika Telychko