Tag: tactics
-
Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders
The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and tactics, techn… First seen on gbhackers.com Jump to article: gbhackers.com/ransomhub-attacked-210-victims-since-feb-2024/
-
Operation DevilTiger: APT12’s Shadowy Tactics and Zero-Day Exploits Unveiled
The QiAnXin Threat Intelligence Center has disclosed the technical details of a sophisticated cyber espionage campaign dubbed >>Operation DevilTiger,
-
LummaC2 Infostealer Resurfaces With Obfuscated PowerShell Tactics
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/lummac2-infostealer-obfuscated/
-
Dodging the Cyber Bullet: Early Signs of a Ransomware Attack
Ransomware attacks are a growing menace. Malicious actors are constantly honing their tactics to exploit vulnerabilities and extort ransoms from busin… First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/08/19/dodging-the-cyber-bullet-early-signs-of-a-ransomware-attack/
-
Operation DevilTiger, APT Hackers 0-Day Exploitation Tactics Exposed
The APT-Q-12 group, also known as Pseudo Hunter, is a Northeast Asian threat actor linked to Darkhotel, which primarily targets East Asian countries, … First seen on gbhackers.com Jump to article: gbhackers.com/deviltiger-apt-zero-day/
-
BlackByte Ransomware Group Exploits VMware CVE-2024-37085 Flaw, Shifts Tactics
The BlackByte ransomware group has re-emerged with an unsettling surge in activity and a refined set of tactics, techniques, and procedures (TTPs) tha… First seen on securityonline.info Jump to article: securityonline.info/blackbyte-ransomware-group-exploits-vmware-cve-2024-37085-flaw-shifts-tactics/
-
Bling Libra’s Tactical Evolution: Exploiting Cloud Misconfigurations for Extortion
Cybersecurity researchers at Unit 42 have uncovered a concerning shift in the tactics employed by the notorious threat actor group, Bling Libra. Previ… First seen on securityonline.info Jump to article: securityonline.info/bling-libras-tactical-evolution-exploiting-cloud-misconfigurations-for-extortion/
-
MCTTP (Munich Cyber Tactics Techniques and Procedures) 2024 Professionals brauchen den Human Touch
First seen on security-insider.de Jump to article: www.security-insider.de/mcttp-2024-menschliche-verhaltensweisen-in-der-it-sicherheit-a-fee5a8c601fabf63867738348511daef/
-
Cthulhu Stealer Malware Targets macOS With Deceptive Tactics
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cthulhu-stealer-malware-macos/
-
Fraud tactics and the growing prevalence of AI scams
In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam more than 107 million spam calls everyday. The data showed spa… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/08/23/fraud-tactics-ai-scams/
-
Multi-Stage ValleyRAT Targets Chinese Users with Advanced Tactics
Chinese-speaking users are the target of an ongoing campaign that distributes malware known as ValleyRAT.ValleyRAT is a multi-stage malware that utili… First seen on thehackernews.com Jump to article: thehackernews.com/2024/08/multi-stage-valleyrat-targets-chinese.html
-
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligenc… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/novel-threat-tactics-notable-vulnerabilities-and-current-trends-for-july/
-
Most ransomware attacks occur between 1 a.m. and 5 a.m.
There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cyb… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/08/22/ransomware-attacks-time/
-
MCTTP (Munich Cyber Tactics Techniques and Procedures) 2024 – Active Directory (AD) im Fokus des Cybercrime
First seen on security-insider.de Jump to article: www.security-insider.de/mcttp-2024-ad-angriffe-und-schutz-a-0fbb5e573252c826d6da0895cff1ad9f/
-
EastWind Campaign: New CloudSorcerer Attacks Target Russian Gov Using APT31 and APT27 Tactics
Kaspersky Labs has uncovered a series of sophisticated cyberattacks targeting Russian government organizations and IT companies, now dubbed the >>East… First seen on securityonline.info Jump to article: securityonline.info/eastwind-campaign-new-cloudsorcerer-attacks-target-russian-gov-using-apt31-and-apt27-tactics/
-
Mad Liberator Ransomware Group Exploits Anydesk to Steal Data in Stealthy Attacks
Sophos X-Ops Incident Response team has recently uncovered the tactics of a relatively new ransomware group known as Mad Liberator, which has been act… First seen on securityonline.info Jump to article: securityonline.info/mad-liberator-ransomware-group-exploits-anydesk-to-steal-data-in-stealthy-attacks/
-
New APT Group ‘Actor240524’ Targets Azerbaijan and Israel with Advanced Tactics
A sophisticated cyber espionage campaign targeting Azerbaijan and Israel has been linked to a previously unidentified advanced persistent threat (APT)… First seen on securityonline.info Jump to article: securityonline.info/new-apt-group-actor240524-targets-azerbaijan-and-israel-with-advanced-tactics/
-
Ransomware Gangs’ New Tactic: Weaponizing Legitimate Entities
According to Sophos, cybercriminals are continually refining their methods of exerting pressure on victims. Over the past three years, the tactics emp… First seen on securityonline.info Jump to article: securityonline.info/ransomware-gangs-new-tactic-weaponizing-legitimate-entities/
-
Ransomware Surge Exploits Cybersecurity Gaps Caused by MA
Evolving threat actor tactics are capitalizing on business and technology consolidation to launch widespread ransomware attacks and requiring organiza… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/ransomware-surge-exploits-cybersecurity-gaps-caused-by-ma/
-
MCTTP Munich Cyber Tactics, Techniques and Procedures 2024 – Cyberrisiken und Cybersecurity sind keine graue Theorie
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-personalmangel-loesungsansaetze-a-89cd23c09f451c8153f25864adc9b93d/
-
Ransomware-Gruppen erhöhen Druck auf Zahlungsunwillige
Sophos X-Ops beschreibt in seinem neuen Dark-Web-Report
-
Basta Ransomware Operator Tactics Undergo ‘Notable Shift’
UNC4393, a top Basta ransomware operator, has switched its initial access vector, showing the ongoing influences in the threat landscape a year after … First seen on duo.com Jump to article: duo.com/decipher/notable-shift-seen-in-basta-ransomware-initial-access
-
Malware-asService and Ransomware-asService lower barriers for cybercriminals
The sophistication of cyber threats has escalated dramatically, with malicious actors’ deploying advanced tactics, techniques, and procedures (TTPs) t… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/08/09/maas-threat-landscape/
-
Insurance Fraudsters Mirror Tactics From Banking Industry
Panelists Discuss the Surge in Identity Fraud and Cybercrime in Insurance Sector. The insurance industry faces rapidly changing fraud tactics from sop… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/insurance-fraudsters-mirror-tactics-from-banking-industry-a-26001
-
North Korea-Linked Malware Targets Developers on Windows, Linux, and macOS
The threat actors behind an ongoing malware campaign targeting software developers have demonstrated new malware and tactics, expanding their focus to… First seen on thehackernews.com Jump to article: thehackernews.com/2024/07/north-korea-linked-malware-targets.html
-
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
Overview Leveraging NSFOCUS’s Global Threat Hunting System, NSFOCUS Security Labs (NSL) captured an attack campaign targeting Azerbaijan and Israel on… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/new-apt-group-actor240524-a-closer-look-at-its-cyber-tactics-against-azerbaijan-and-israel/
-
MCTTP (Munich Cyber Tactics Techniques and Procedures) 2024 Professionals als Krisenmanager
First seen on security-insider.de Jump to article: www.security-insider.de/mcttp-2024-cyberangriffe-krisenpraevention-management-a-9187a8df32e3f776b9085d83a7fe69c4/

