Tag: tactics
-
VPNs and Clouds: New Tools in the APT Arsenal, ESET Warns
ESET’s latest APT Activity Report for April through September 2024 offers new insights into the evolving tactics, targets, and geographical reach of state-aligned Advanced Persistent Threat (APT) groups. The report... First seen on securityonline.info Jump to article: securityonline.info/vpns-and-clouds-new-tools-in-the-apt-arsenal-eset-warns/
-
North Korean Hackers Employing New Tactic To Acruire Remote Jobs
North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their scrip… First seen on gbhackers.com Jump to article: gbhackers.com/north-korean-hackers-remote-tactics/
-
Silent Skimmer Reemerges: New Tactics Target Payment Gateways
Unit 42 researchers have detected renewed activity from a notorious financially motivated threat actor known as Silent Skimmer. This cybercriminal group, first identified in 2023, had seemingly faded into the... First seen on securityonline.info Jump to article: securityonline.info/silent-skimmer-reemerges-new-tactics-target-payment-gateways/
-
North Korean hackers employ new tactics to compromise crypto-related businesses
North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/07/north-korean-crypto-related-phishing/
-
5 Most Common Malware Techniques in 2024
Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN’s Q3 2024 report on malware trends, complete with real-world examples.Disabling of Windows…
-
APT36 Advances with ElizaRAT and ApoloStealer: New Tactics in Espionage Against India
In a new report, cybersecurity researchers from Check Point detail the evolution of ElizaRAT, a remote access tool (RAT) used by the notorious APT36, also known as Transparent Tribe. The... First seen on securityonline.info Jump to article: securityonline.info/apt36-advances-with-elizarat-and-apolostealer-new-tactics-in-espionage-against-india/
-
BTS #41 Pacific Rim
In this episode, Paul Asadorian, Larry Pesce, and Evan Dornbush delve into the recent Sophos reports on threat actors, particularly focusing on the Pacific Rim case. They discuss the implications of the findings, including the tactics used by attackers, the vulnerabilities in network devices, and the challenges of securing appliances. The conversation also highlights the……
-
New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics
Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection… First seen on thehackernews.com Jump to article: thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
-
Iranian Cyber Group Emennet Pasargad’s Expanding Operations Targeting Global Networks
A joint cybersecurity advisory from the FBI, U.S. Department of Treasury, and Israel National Cyber Directorate has revealed new tactics employed by t… First seen on securityonline.info Jump to article: securityonline.info/iranian-cyber-group-emennet-pasargads-expanding-operations-targeting-global-networks/
-
New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection
New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass anti-fraud measures, indicating that … First seen on thehackernews.com Jump to article: thehackernews.com/2024/10/new-grandoreiro-banking-malware.html
-
Threat actors are stepping up their tactics to bypass email protections
Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass thes… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/01/cybercriminals-emails-protections-video/
-
Chenlun’s Evolving Phishing Tactics Target Trusted Brands
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chenluns-phishing-tactics-target/
-
Pig Butchers Enter the Gig Economy, Targeting Job Seekers in Cryptocurrency Scams
In a recent report, Proofpoint reveals how cybercriminals have evolved their tactics, preying on job seekers with fraudulent job offers that ultimatel… First seen on securityonline.info Jump to article: securityonline.info/pig-butchers-enter-the-gig-economy-targeting-job-seekers-in-cryptocurrency-scams/
-
Evasion Tactics – Wie Hacker unsere Sicherheitslösungen austricksen
First seen on security-insider.de Jump to article: www.security-insider.de/cyberkriminalitaet-evasion-tactics-unternehmenssicherheit-a-0e5831e371e2df48f772c8c945ba0f00/
-
The Ultimate Pentest Checklist for Full-Stack Security
Pentest Checklists Are More Important Than EverGiven the expanding attack surface coupled with the increasing sophistication of attacker tactics and t… First seen on thehackernews.com Jump to article: thehackernews.com/2024/10/guide-ultimate-pentest-checklist-for.html
-
FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities
The FakeCall Android banking trojan now employs advanced evasion tactics and expanded surveillance capabilities, posing heightened risks for banks and… First seen on securityweek.com Jump to article: www.securityweek.com/fakecall-android-trojan-evolves-with-new-evasion-tactics-and-expanded-espionage-capabilities/
-
Fraudsters revive old tactics mixed with modern technology
Threat actors continue to probe the payments ecosystem for vulnerabilities and were successful in conducting fraud schemes affecting multiple financia… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/10/28/payments-fraud-schemes/
-
Ransomware Task Force finds 73% attack increase in 2023
The Institute for Security and Technology’s Ransomware Task Force says a shift to big game hunting tactics led to a significant rise in attacks last y… First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366611898/Ransomware-Task-Force-finds-73-attack-increase-in-2023
-
Akira Double-Extortion Ransomware Tactics Return
First seen on scworld.com Jump to article: www.scworld.com/brief/akira-double-extortion-ransomware-tactics-return
-
ISMG Editors: 2024 Election Security, Tackling Global Threats
Examining Cyberthreats, Foreign Tactics Aimed at 2024 U.S. Election. In the latest weekly update, election security expert Annie Fixler joined ISMG ed… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-2024-election-security-tackling-global-threats-a-26631
-
North Korean IT Worker Schemes Evolve: From Salary Scams to Cyber Extortion
A new report from Secureworks® Counter Threat Unit (CTU) researchers has revealed a disturbing escalation in the tactics used by North Korean governme… First seen on securityonline.info Jump to article: securityonline.info/north-korean-it-worker-schemes-evolve-from-salary-scams-to-cyber-extortion/
-
How Hybrid Password Attacks Work and How to Defend Against Them
Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password att… First seen on thehackernews.com Jump to article: thehackernews.com/2024/10/how-hybrid-password-attacks-work-and.html
-
FBI CISA Warns of Tactics Used by Hackers Targeting 2024 U.S. General Election
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint public service announcem… First seen on gbhackers.com Jump to article: gbhackers.com/fbi-cisa-warns-of-tactics-used-by-hackers/
-
Microsoft creates fake Azure tenants to pull phishers into honeypots
Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercrimina… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/
-
North Korean IT Scam Workers Shift to Extortion Tactics
Report Reveals North Korean Workers Expanding into Intellectual Property Theft. North Korean threat actors posing as remote information technology wor… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/north-korean-scam-workers-shift-to-extortion-tactics-a-26564
-
SHROUDED#SLEEP: APT37’s Advanced Evasion and Persistence Tactics in Southeast Asia
In a recent discovery, the Securonix Threat Research team, led by Den Iuzvyk and Tim Peck, has uncovered a stealthy malware campaign attributed to Nor… First seen on securityonline.info Jump to article: securityonline.info/shroudedsleep-apt37s-advanced-evasion-and-persistence-tactics-in-southeast-asia/
-
Cyberattackers Use HR Targets to Lay More_Eggs Backdoor
The FIN6 group is the likely culprit behind a spear-phishing campaign that demonstrates a shift in tactics, from targeting job seekers to going after … First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/attackers-targeting-recruiters-more_eggs-backdoor
-
Storm-0501 Targets Hybrid Clouds with Evolving Ransomware Tactics
In a recent report from Microsoft Threat Intelligence, the cybercriminal group Storm-0501 has been identified as a rising threat, targeting hybrid clo… First seen on securityonline.info Jump to article: securityonline.info/storm-0501-targets-hybrid-clouds-with-evolving-ransomware-tactics/
-
Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar
Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly…. First seen on thehackernews.com Jump to article: thehackernews.com/2024/09/discover-latest-ransomware-tactics-and.html

