Tag: tactics
-
Novel influence operation tactics expected to be leveraged in US elections
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/novel-influence-operation-tactics-expected-to-be-leveraged-in-us-elections
-
Digging Into FIN7’s Latest Tools and Tactics
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as AvNeutralizer for m… First seen on duo.com Jump to article: duo.com/decipher/digging-into-fin7-s-latest-tools-and-tactics
-
MCTTP (Munich Cyber Tactics Techniques and Procedures) 2024 Professionals gehen in die Offensive
First seen on security-insider.de Jump to article: www.security-insider.de/abwehr-cyberattacken-einblick-mcttp-2024-a-101848737cd3e0d5b03fab4f39436746/
-
Black Basta ransomware switches to more evasive custom malware
The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to eva… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/black-basta-ransomware-switches-to-more-evasive-custom-malware/
-
Influence actors expected to adjust tactics amid chaotic election cycle, intel official says
First seen on therecord.media Jump to article: therecord.media/influence-actors-likely-to-adjust-tactics-amid-election-chaos
-
Email Gateway Security Gaps Enable New Malware Tactics
Static Scanning Limitations Usher Malware Onto Corporate Network. Phishing hackers have developed a new technique for smuggling malware past secure em… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/email-gateway-security-gaps-enable-new-malware-tactics-a-25839
-
Qilin Ransomware’s Sophisticated Tactics Unveiled By Experts
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/qilin-ransomwares-tactics-unveiled/
-
Kimsuky APT: New TTPs Revealed in Rapid7 Cybersecurity Report
Rapid7, a leading cybersecurity firm, has released a comprehensive report detailing the evolving tactics, techniques, and procedures (TTPs) of the Kim… First seen on securityonline.info Jump to article: securityonline.info/kimsuky-apt-new-ttps-revealed-in-rapid7-cybersecurity-report/
-
MCTTP Munich Cyber Tactics, Techniques and Procedures 2024 – Was Security-Professionals über Compliance wissen müssen
First seen on security-insider.de Jump to article: www.security-insider.de/mcttp-2024-cybersicherheit-ursachen-antworten-strategien-a-311a0f3e3c58f945dcc222e3d37fc274/
-
Malware Exploit Bypasses SEGs Leaving Organizations at Risk
Threat actors continually leverage and create a plethora of tactics to bypass Secure Email Gateways (SEGs). These include encoding malicious URLs with… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/malware-exploit-bypasses-segs-leaving-organizations-at-risk/
-
MCTTP (Munich Cyber Tactics Techniques and Procedures) 2024 – Geballtes Praxiswissen für Security-Professionals
First seen on security-insider.de Jump to article: www.security-insider.de/mcttp-2024-intensivprogramm-cybersicherheit-muenchen-a-181d089d958e001ce18805e6bac771e1/
-
What You Need to Know About SEC Compliance Requirements
Expanding attack surfaces and complex threats mean MSP partners carry more risk than ever before. Read on for tactics to balance the value to risk rat… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/what-you-need-to-know-about-sec-compliance-requirements-2/
-
BlackSuit’s Advanced Ransomware Tactics Exposed: Masquerades as Antivirus
In a recent series of events that disrupted major operations, the KADOKAWA Corporation experienced service outages that extended to multiple websites…. First seen on securityonline.info Jump to article: securityonline.info/blacksuits-advanced-ransomware-tactics-exposed-masquerades-as-antivirus/
-
Ever Wonder How Hackers Really Steal Passwords? Discover Their Tactics in This Webinar
In today’s digital age, passwords serve as the keys to our most sensitive information, from social media accounts to banking and business systems. Thi… First seen on thehackernews.com Jump to article: thehackernews.com/2024/07/ever-wonder-how-hackers-really-steal.html
-
Black Basta might have exploited Microsoft flaw as zero-day
While investigating a ransomware attack, Symantec observed tactics, techniques and procedures that suggest Black Basta threat actors exploited a Micro… First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366588641/Black-Basta-may-have-exploited-Microsoft-flaw-as-zero-day
-
Beware! of New Phishing Tactics Mimic as HR Attacking Employees
Phishing attacks are becoming increasingly sophisticated, and the latest strategy targeting employees highlights this evolution. This new phishing att… First seen on gbhackers.com Jump to article: gbhackers.com/phishing-tactics-impersonating/
-
Webinar Alert: Learn How ITDR Solutions Stop Sophisticated Identity Attacks
Identity theft isn’t just about stolen credit cards anymore. Today, cybercriminals are using advanced tactics to infiltrate organizations and cause ma… First seen on thehackernews.com Jump to article: thehackernews.com/2024/07/webinar-alert-learn-how-itdr-solutions.html
-
API Transformation Cyber Risks and Survival Tactics
As you think about how to ensure your APIs are within your risk tolerance, ensure that you have a sound understanding of your inventory and the data a… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/api-transformation-cyber-risks-and-survival-tactics/
-
Response to CISA Advisory (AA24-193A): CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth
AttackIQ has released two new assessment templates in response to the CISA Advisory (AA24-193A) published on July 11, 2024, that disseminates Tactics,… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/response-to-cisa-advisory-aa24-193a-cisa-red-teams-operations-against-a-federal-civilian-executive-branch-organization-highlights-the-necessity-of-defense-in-depth/
-
CRYSTALRAY hacker expands to 1,500 breached systems using SSH-Snake tool
A new threat actor known as CRYSTALRAY has significantly broadened its targeting scope with new tactics and exploits, now counting over 1,500 victims … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/crystalray-hacker-expands-to-1-500-breached-systems-using-ssh-snake-tool/
-
Ransomware gangs are adopting more brutal tactics amid crackdowns
First seen on arstechnica.com Jump to article: arstechnica.com/
-
Chinese APT40 hackers hijack SOHO routers to launch attacks
An advisory by CISA and multiple international cybersecurity agencies highlights the tactics, techniques, and procedures (TTPs) of APT40 (aka Kryptoni… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-apt40-hackers-hijack-soho-routers-to-launch-attacks/
-
DarkGate switches up its tactics with new payload, email templates
This post was authored by Kalpesh Mantri. Cisco Talos is actively tracking a recent increase in activity from malicious email ca… First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/darkgate-remote-template-injection/
-
Understanding the FakeBat Loader: Distribution Tactics and Cybercriminal Infrastructure
In the first half of 2024, the FakeBat loader, also known as EugenLoader or PaykLoader, emerged as a prominent threat leveraging the drive-by download… First seen on thecyberexpress.com Jump to article: thecyberexpress.com/fakebat-loader/
-
China-Sponsored Attackers Target 40K Corporate Users in 90 Days
The attacks infiltrate enterprise networks through browsers, and show an evolution in evasive and adaptive tactics from well-resourced state-sponsored… First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/china-sponsored-attackers-40k-corporate-users
-
The Tactics of ‘Supposed Grasshopper’: Malware Strikes Israeli Government and Companies
A recent cybersecurity investigation has uncovered a sophisticated operation known as Supposed Grasshopper, targeting both Israeli government entities… First seen on thecyberexpress.com Jump to article: thecyberexpress.com/supposed-grasshopper-campaign/
-
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed … First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html
-
Cut & Paste Tactics Import Malware to Unwitting Victims
ClearFake and ClickFix attackers are tricking people into cutting and pasting malicious PowerShell scripts to infect their own machines with RATs and … First seen on darkreading.com Jump to article: www.darkreading.com/remote-workforce/cut-paste-tactics-import-malware
-
North Korean Hackers Target Brazilian Fintech with Sophisticated Phishing Tactics
Threat actors linked to North Korea have accounted for one-third of all the phishing activity targeting Brazil since 2020, as the country’s emergence … First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/north-korean-hackers-target-brazilian.html

