Tag: tactics
-
Multifactor Authentication Bypass: Attackers Refine Tactics
Push Fatigue Attacks Succeed 5% of the Time, Surge in the Morning, Researchers Find Multifactor authentication is a must-have security defense for rep… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/blogs/multifactor-authentication-bypass-attackers-refine-tactics-p-3645
-
Chinese Velvet Ant Hackers Target F5 Devices in Years-Long Espionage
cover how China-linked Velvet Ant APT exploited F5 BIG-IP devices for years undetected. Sygnia’s detailed analysis exposes tactics used to maintain pe… First seen on hackread.com Jump to article: hackread.com/chinese-velvet-ant-hackers-target-f5-devices/
-
China-Linked ValleyRAT Malware Resurfaces with Advanced Data Theft Tactics
Cybersecurity researchers have uncovered an updated version of malware called ValleyRAT that’s being distributed as part of a new campaign.In the late… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/china-linked-valleyrat-malware.html
-
eBook: The Art Science of Secure Software Development
Software security requires a creative and disciplined approach. It involves having the vision to develop secure strategy, tactics, and execution. Exce… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/06/18/secure-software-development-ebook/
-
Cybercrime Targeting Paris 2024 Olympic Games Gains Steam
The variety of tactics, from fake lotteries to impersonating officials, demonstrates the broad scope of threats targeting the Paris 2024 Olympic Games… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/cybercrime-targeting-paris-2024-olympic-games-gains-steam/
-
A Deep Dive Into the Economics and Tactics of Modern Ransomware Threat Actors
The MGM Resorts breach is just one example demonstrating the crippling financial, legal and operational consequences of ransomware incidents. The post… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/a-deep-dive-into-the-economics-and-tactics-of-modern-ransomware-threat-actors/
-
Black Basta may have exploited Microsoft flaw as zero-day
While investigating a ransomware attack, Symantec observed tactics, techniques and procedures that suggest Black Basta threat actors exploited a Micro… First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366588641/Black-Basta-may-have-exploited-Microsoft-flaw-as-zero-day
-
Ransomware gangs are adopting more brutal tactics amidst crackdowns
First seen on arstechnica.com Jump to article: arstechnica.com/
-
Russian Hackers In Attempt To Distrupt The 2024 Paris Olympic Games
Russia is intensifying disinformation campaigns against France, President Macron, the IOC, and the 2024 Paris Olympics, blending decades-old tactics w… First seen on gbhackers.com Jump to article: gbhackers.com/russia-hackers-paris-olympic/
-
Russian Threat Groups Turn Eyes to the Paris Olympic Games
Russian threat groups are using old tactics and generative AI to run malicious disinformation campaigns meant to discredit the Paris Olympic Games, Fr… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/russian-threat-groups-turn-eyes-to-the-paris-olympic-games/
-
The Configuration is MITRE than the Tool
Introduction: MITRE ATT&CK stands as a cornerstone for understanding adversary tactics and techniques based on real-world observations. For SOC te… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/the-configuration-is-mitre-than-the-tool/
-
New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts
The China-linked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the Caribbean as p… First seen on thehackernews.com Jump to article: thehackernews.com/2024/05/new-frontiers-old-tactics-chinese-cyber.html
-
Inside Operation Diplomatic Specter: Chinese APT Group’s Stealthy Tactics Exposed
Governmental entities in the Middle East, Africa, and Asia are the target of a Chinese advanced persistent threat (APT) group as part of an ongoing cy… First seen on thehackernews.com Jump to article: thehackernews.com/2024/05/inside-operation-diplomatic-specter.html
-
RedTail Cryptomining Malware Exploits PAN-OS Vulnerability
Threat Actors Mirror the Tactics of North Korea’s Lazarus Group. Cryptomining malware that might be North Korean in origin is targeting edge devices, … First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/redtail-cryptomining-malware-exploits-pan-os-vulnerability-a-25371
-
New North Korean Threat Actor Engaging in Espionage, Revenue Generation Attacks
Microsoft dives into the tactics, techniques, and procedures of North Korean threat actor Moonstone Sleet. The post t dives into the tactics, techniqu… First seen on securityweek.com Jump to article: www.securityweek.com/new-north-korean-threat-actor-engaging-in-espionage-revenue-generation-attacks/
-
HP Report Surfaces Shifts in Cyber Attack Tactics
Cyber attack tactics are evolving, according to a new report, from advanced campaigns to exploiting weaknesses, and cybersecurity teams should be opti… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/hp-report-surfaces-shifts-in-cyber-attack-tactics/
-
Russian Hackers Shift Tactics, Target More Victims with Paid Malware
First seen on hackread.com Jump to article: www.hackread.com/russian-hackers-target-victims-with-paid-malware/
-
Microsoft spots gift card thieves using cyber-espionage tactics
Microsoft has published a Cyber Signals report sharing new information about the hacking group Storm-0539 and a sharp rise in gift card theft as we ap… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-spots-gift-card-thieves-using-cyber-espionage-tactics/
-
Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT
AttackIQ has released two new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the op… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/emulating-the-open-source-remote-access-trojan-rat-asyncrat/
-
Cybercriminals shift tactics to pressure more victims into paying ransoms
Ransomware didn’t just grow in the US in 2023, it evolved, with the frequency of ransomware claims jumping 64% year-over-year, according to At-Bay. Th… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/05/20/ransomware-claims-frequency-grow/
-
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In April, the team discussed threat intelligen… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/novel-threat-tactics-notable-vulnerabilities-and-current-trends-for-april-2024/
-
Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta
AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA24-131A) which disseminates known Tactics, Techniques,… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/response-to-cisa-advisory-aa24-131a-stopransomware-black-basta/
-
Expert-Led Webinar – Uncovering Latest DDoS Tactics and Learn How to Fight Back
In today’s rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these c… First seen on thehackernews.com Jump to article: thehackernews.com/2024/05/expert-led-webinar-learn-latest-ddos.html
-
RSAC: Experts Highlight Novel Cyber Threats and Tactics
Well-funded cybercriminals are adopting more sophisticated techniques, creating a need for defenders to stay informed about the evolving threat landsc… First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/experts-highlight-novel-cyber/
-
The Psychological Underpinnings of Modern Hacking Techniques
The tactics employed by hackers today aren’t new; they’re simply adapted for the digital age, exploiting the same human weaknesses that have always ex… First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/the-psychological-underpinnings-of-modern-hacking-techniques
-
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that att… First seen on thehackernews.com Jump to article: thehackernews.com/2024/04/navigating-threat-landscape.html
-
Cato Networks to Showcase New Security Evasion Tactics at RSA Conference 2024
Cato Networks, the SASE leader, today announced that Cato CTRL, the SASE leader’s cyber threat intelligence (CTI) research team, will demonstrate thre… First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/04/26/cato-networks-to-showcase-new-security-evasion-tactics-at-rsa-conference-2024/
-
USB Malware Attacks Targeting Industrial Systems Adapts LOL Tactics
Honeywell’s 2024 GARD USB Threat Report analyzes malware discovered on USB devices used in industrial settings, highlighting a significant increase in… First seen on gbhackers.com Jump to article: gbhackers.com/usb-malware-attacks/

