Tag: tactics
-
Stargazers Ghost Network
by
in SecurityNewsesearch by: Antonis Terefos (@Tera0017) Key Points Introduction Threat actors continually evolve their tactics to stay ahead of detection. Traditional… First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/stargazers-ghost-network/
-
MFA bypass becomes a critical security issue as ransomware tactics advance
by
in SecurityNewsRansomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the p… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/09/24/ransomware-session-hijacking-tactics/
-
Russian hackers have shifted tactics in third year of war, Ukraine cyber agency says
First seen on therecord.media Jump to article: therecord.media/russian-hackers-shifting-tactics-ukraine
-
ENISA Warns About Hacktivist, Ransomware Crossover
by
in SecurityNewsHacktivists Are Likely to Increasingly Adopt Cybercrime Tactics, Report Says. Ransomware hacks and self-declared hacktivist denial-of-services attacks… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/enisa-warns-about-hacktivist-ransomware-crossover-a-26333
-
RansomHub Adopts New Tactics in Latest Attack, Bypasses EDR and Harvests Credentials
by
in SecurityNewsRecently, the ThreatDown Managed Detection and Response (MDR) team has uncovered a novel attack method employed by the RansomHub ransomware group. The… First seen on securityonline.info Jump to article: securityonline.info/ransomhub-adopts-new-tactics-in-latest-attack-bypasses-edr-and-harvests-credentials/
-
Crimson Palace Returns: Chinese State-Sponsored Cyber Espionage Operation Escalates with New Tools and Targets
After a brief hiatus, the Crimson Palace operation, a Chinese state-directed cyber espionage campaign, has resurfaced, armed with new tactics and an e… First seen on securityonline.info Jump to article: securityonline.info/crimson-palace-returns-chinese-state-sponsored-cyber-espionage-operation-escalates-with-new-tools-and-targets/
-
How Law Enforcement’s Ransomware Strategies Are Evolving
by
in SecurityNewsThe threat of ransomware hasn’t gone away. But law enforcement has struck a blow by adjusting its tactics and taking out some of the biggest adversari… First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/how-law-enforcement-ransomware-strategies-are-evolving
-
Threat Actors Continue to Utilize HR-Related Phishing Tactics
by
in SecurityNewsFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/threat-actors-continue-to-utilize-hr-related-phishing-tactics/
-
Crimson Palace Returns With New Hacking Tolls And Tactics
by
in SecurityNewsCluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these attacker… First seen on gbhackers.com Jump to article: gbhackers.com/crimson-palace-hacking-tools-tactics/
-
Fake Recruiter Coding Tests Target Developers with Malicious Python Packages in Ongoing North Korean Cyber Campaign
by
in SecurityNewsA new report from ReversingLabs has uncovered a sophisticated cyber campaign targeting developers, using fake recruiter tactics to deliver malicious P… First seen on securityonline.info Jump to article: securityonline.info/fake-recruiter-coding-tests-target-developers-with-malicious-python-packages-in-ongoing-north-korean-cyber-campaign/
-
Earth Preta’s Cyber Arsenal Expands: New Malware and Strategies Target APAC Governments
by
in SecurityNewsA new report from Trend Micro has revealed that Earth Preta, the notorious cyber espionage group, has significantly evolved its tactics and malware ar… First seen on securityonline.info Jump to article: securityonline.info/earth-pretas-cyber-arsenal-expands-new-malware-and-strategies-target-apac-governments/
-
Cybersecurity Talent Shortage Prompts White House Action
by
in SecurityNewsThe Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT security roles… First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/cybersecurity-talent-shortage-prompts-white-house-action
-
Quad7 botnet evolves to more stealthy tactics to evade detection
The Quad7 botnet evolves and targets new SOHO devices, including Axentra media servers, Ruckus wireless routers and Zyxel VPN appliances. The Sekoia … First seen on securityaffairs.com Jump to article: securityaffairs.com/168250/malware/quad7-botnet-evolves.html
-
Evasion Tactics Used By Cybercriminals To Fly Under The Radar
by
in SecurityNewsRelentless in their methods, attackers will continue employing evasion tactics to circumvent traditional security measures. The post Evasion Tactics U… First seen on securityweek.com Jump to article: www.securityweek.com/evasion-tactics-used-by-cybercriminals-to-fly-under-the-radar/
-
Emulating the Persistent and Stealthy Ebury Linux Malware
by
in SecurityNewsAttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Desp… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/emulating-the-persistent-and-stealthy-ebury-linux-malware/
-
Predator Spyware Roars Back: New Infrastructure, Evasive Tactics
by
in SecurityNewsRecently, cybersecurity researchers from Insikt Group have identified a resurgence of Predator spyware infrastructure, previously believed to be large… First seen on securityonline.info Jump to article: securityonline.info/predator-spyware-roars-back-new-infrastructure-evasive-tactics/
-
Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics
by
in SecurityNewsIntroduction Following the 2024 ThreatLabz Phishing Report, Zscaler ThreatLabz has been closely tracking domains associated with typosquatting and bra… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/phishing-via-typosquatting-and-brand-impersonation-trends-and-tactics/
-
Black Basta’s Evolving Tactics and the Rising Role of LLMs in Cyber Attack
by
in SecurityNewsOn the latest episode of the Microsoft Threat Intelligence podcast, host Sherrod DeGrippo and her expert guests delved into the cutting-edge technique… First seen on securityonline.info Jump to article: securityonline.info/black-bastas-evolving-tactics-and-the-rising-role-of-llms-in-cyber-attack/
-
Kimsuky-linked hackers use similar tactics to attack Russia and South Korea, researchers say
First seen on therecord.media Jump to article: therecord.media/kimsuky-north-korea-hackers-targeting-russia-south-korea
-
Notorious Mallox Ransomware Evolved From Private Ransomware to RaaS
by
in SecurityNewsMallox is a sophisticated ransomware that is known for its destructive capabilities and multi-extortion tactics, which include encrypting victims’ dat… First seen on gbhackers.com Jump to article: gbhackers.com/notorious-mallox-ransomware-raas/
-
How ransomware tactics are shifting, and what it means for your business
by
in SecurityNewsIn this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) wi… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/09/03/tim-west-withsecure-ransomware-tactics-shifting/
-
BlackByte Adopts New Tactics, Targets ESXi Hypervisors
by
in SecurityNews
Tags: tacticsFirst seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/blackbyte-targets-esxi-hypervisors/
-
Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders
by
in SecurityNewsThe FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and tactics, techn… First seen on gbhackers.com Jump to article: gbhackers.com/ransomhub-attacked-210-victims-since-feb-2024/
-
Operation DevilTiger: APT12’s Shadowy Tactics and Zero-Day Exploits Unveiled
by
in SecurityNewsThe QiAnXin Threat Intelligence Center has disclosed the technical details of a sophisticated cyber espionage campaign dubbed >>Operation DevilTiger,
-
LummaC2 Infostealer Resurfaces With Obfuscated PowerShell Tactics
by
in SecurityNewsFirst seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/lummac2-infostealer-obfuscated/
-
Dodging the Cyber Bullet: Early Signs of a Ransomware Attack
by
in SecurityNewsRansomware attacks are a growing menace. Malicious actors are constantly honing their tactics to exploit vulnerabilities and extort ransoms from busin… First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/08/19/dodging-the-cyber-bullet-early-signs-of-a-ransomware-attack/
-
Operation DevilTiger, APT Hackers 0-Day Exploitation Tactics Exposed
by
in SecurityNewsThe APT-Q-12 group, also known as Pseudo Hunter, is a Northeast Asian threat actor linked to Darkhotel, which primarily targets East Asian countries, … First seen on gbhackers.com Jump to article: gbhackers.com/deviltiger-apt-zero-day/
-
BlackByte Ransomware Group Exploits VMware CVE-2024-37085 Flaw, Shifts Tactics
by
in SecurityNewsThe BlackByte ransomware group has re-emerged with an unsettling surge in activity and a refined set of tactics, techniques, and procedures (TTPs) tha… First seen on securityonline.info Jump to article: securityonline.info/blackbyte-ransomware-group-exploits-vmware-cve-2024-37085-flaw-shifts-tactics/