Tag: tactics
-
Hacktivist Groups Operating Together! Connection Ober TTPs Uncovered
Cybersecurity experts have uncovered a significant connection between hacktivist groups BlackJack and Twelve through overlapping tactics, techniques, … First seen on gbhackers.com Jump to article: gbhackers.com/hacktivist-groups-operating-together/
-
Threat Actors Exploit HR-Related Phishing Tactics in Sophisticated Credential-Stealing Campaigns
Phishing attacks continue to evolve in complexity, and the latest report from the Cofense Phishing Defense Center highlights a troubling trend: cyberc… First seen on securityonline.info Jump to article: securityonline.info/threat-actors-exploit-hr-related-phishing-tactics-in-sophisticated-credential-stealing-campaigns/
-
Patchwork APT Group Unleashes Nexe Backdoor: A New Era in Cyber Espionage Tactics
Recent analyses by Cyble Research and Intelligence Labs (CRIL) have brought to light an ongoing cyber campaign orchestrated by the notorious Patchwork… First seen on thecyberexpress.com Jump to article: thecyberexpress.com/patchwork-apt-group/
-
Embargo ransomware escalates attacks to cloud environments
Microsoft warns that ransomware threat actor Storm-0501 has recently switched tactics and now targets hybrid cloud environments, expanding its strateg… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/
-
New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
Sophos X-Ops caught the Qilin ransomware gang stealing credentials stored by victims’ employees in Google Chrome, heralding further cyber attacks and … First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366608129/New-Qilin-tactics-a-bonus-multiplier-for-ransomware-chaos
-
WalletConnect Scam: A Case Study in Crypto Drainer Tactics
ey takeaways Introduction Crypto drainers are malicious tools that steal digital assets like NFTs, and tokens from cryptocurrency wallets. They often … First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/walletconnect-scam-a-case-study-in-crypto-drainer-tactics/
-
Stargazers Ghost Network
esearch by: Antonis Terefos (@Tera0017) Key Points Introduction Threat actors continually evolve their tactics to stay ahead of detection. Traditional… First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/stargazers-ghost-network/
-
MFA bypass becomes a critical security issue as ransomware tactics advance
Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the p… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/09/24/ransomware-session-hijacking-tactics/
-
ENISA Warns About Hacktivist, Ransomware Crossover
Hacktivists Are Likely to Increasingly Adopt Cybercrime Tactics, Report Says. Ransomware hacks and self-declared hacktivist denial-of-services attacks… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/enisa-warns-about-hacktivist-ransomware-crossover-a-26333
-
RansomHub Adopts New Tactics in Latest Attack, Bypasses EDR and Harvests Credentials
Recently, the ThreatDown Managed Detection and Response (MDR) team has uncovered a novel attack method employed by the RansomHub ransomware group. The… First seen on securityonline.info Jump to article: securityonline.info/ransomhub-adopts-new-tactics-in-latest-attack-bypasses-edr-and-harvests-credentials/
-
Crimson Palace Returns: Chinese State-Sponsored Cyber Espionage Operation Escalates with New Tools and Targets
After a brief hiatus, the Crimson Palace operation, a Chinese state-directed cyber espionage campaign, has resurfaced, armed with new tactics and an e… First seen on securityonline.info Jump to article: securityonline.info/crimson-palace-returns-chinese-state-sponsored-cyber-espionage-operation-escalates-with-new-tools-and-targets/
-
How Law Enforcement’s Ransomware Strategies Are Evolving
The threat of ransomware hasn’t gone away. But law enforcement has struck a blow by adjusting its tactics and taking out some of the biggest adversari… First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/how-law-enforcement-ransomware-strategies-are-evolving
-
Threat Actors Continue to Utilize HR-Related Phishing Tactics
First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/threat-actors-continue-to-utilize-hr-related-phishing-tactics/
-
Crimson Palace Returns With New Hacking Tolls And Tactics
Cluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these attacker… First seen on gbhackers.com Jump to article: gbhackers.com/crimson-palace-hacking-tools-tactics/
-
Fake Recruiter Coding Tests Target Developers with Malicious Python Packages in Ongoing North Korean Cyber Campaign
A new report from ReversingLabs has uncovered a sophisticated cyber campaign targeting developers, using fake recruiter tactics to deliver malicious P… First seen on securityonline.info Jump to article: securityonline.info/fake-recruiter-coding-tests-target-developers-with-malicious-python-packages-in-ongoing-north-korean-cyber-campaign/
-
Earth Preta’s Cyber Arsenal Expands: New Malware and Strategies Target APAC Governments
A new report from Trend Micro has revealed that Earth Preta, the notorious cyber espionage group, has significantly evolved its tactics and malware ar… First seen on securityonline.info Jump to article: securityonline.info/earth-pretas-cyber-arsenal-expands-new-malware-and-strategies-target-apac-governments/
-
Cybersecurity Talent Shortage Prompts White House Action
The Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT security roles… First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/cybersecurity-talent-shortage-prompts-white-house-action
-
Quad7 botnet evolves to more stealthy tactics to evade detection
The Quad7 botnet evolves and targets new SOHO devices, including Axentra media servers, Ruckus wireless routers and Zyxel VPN appliances. The Sekoia … First seen on securityaffairs.com Jump to article: securityaffairs.com/168250/malware/quad7-botnet-evolves.html
-
Evasion Tactics Used By Cybercriminals To Fly Under The Radar
Relentless in their methods, attackers will continue employing evasion tactics to circumvent traditional security measures. The post Evasion Tactics U… First seen on securityweek.com Jump to article: www.securityweek.com/evasion-tactics-used-by-cybercriminals-to-fly-under-the-radar/
-
Emulating the Persistent and Stealthy Ebury Linux Malware
AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Desp… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/emulating-the-persistent-and-stealthy-ebury-linux-malware/
-
Predator Spyware Roars Back: New Infrastructure, Evasive Tactics
Recently, cybersecurity researchers from Insikt Group have identified a resurgence of Predator spyware infrastructure, previously believed to be large… First seen on securityonline.info Jump to article: securityonline.info/predator-spyware-roars-back-new-infrastructure-evasive-tactics/
-
Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics
Introduction Following the 2024 ThreatLabz Phishing Report, Zscaler ThreatLabz has been closely tracking domains associated with typosquatting and bra… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/phishing-via-typosquatting-and-brand-impersonation-trends-and-tactics/
-
Black Basta’s Evolving Tactics and the Rising Role of LLMs in Cyber Attack
On the latest episode of the Microsoft Threat Intelligence podcast, host Sherrod DeGrippo and her expert guests delved into the cutting-edge technique… First seen on securityonline.info Jump to article: securityonline.info/black-bastas-evolving-tactics-and-the-rising-role-of-llms-in-cyber-attack/
-
Notorious Mallox Ransomware Evolved From Private Ransomware to RaaS
Mallox is a sophisticated ransomware that is known for its destructive capabilities and multi-extortion tactics, which include encrypting victims’ dat… First seen on gbhackers.com Jump to article: gbhackers.com/notorious-mallox-ransomware-raas/
-
How ransomware tactics are shifting, and what it means for your business
In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) wi… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/09/03/tim-west-withsecure-ransomware-tactics-shifting/
-
BlackByte Adopts New Tactics, Targets ESXi Hypervisors
Tags: tacticsFirst seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/blackbyte-targets-esxi-hypervisors/

