EHA
Moonstone Sleet New North Korean Hacker Group With Unique Tricks

Moonstone Sleet New North Korean Hacker Group With Unique Tricks

Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet (formerly Storm-1789). This actor uses a combination of many tried-and-true techniques used by other North Korean threat actors and unique attack...
Chinese Hackers Using ORB Proxy Networks For Stealthy Cyber Attacks

Chinese Hackers Using ORB Proxy Networks For Stealthy Cyber Attacks

Researchers found that cyber espionage groups with ties to China are increasingly using complicated proxy networks called Operational Relay Box (ORB) networks. These networks are made up of mesh networks made from hacked devices...
LATRODECTUS Loader Getting Popular Among Cybercriminals, Is It Replacing ICEDID!

LATRODECTUS Loader Getting Popular Among Cybercriminals, Is It Replacing ICEDID!

Hackers use loaders to bypass security measures and run harmful code in a genuine process's memory themselves.  This makes it possible for malware payloads to be quietly loaded into the system without being discovered by...
How to Use Threat Intelligence Feeds for SOC/DFIR Teams

How to Use Threat Intelligence Feeds for SOC/DFIR Teams

Threat intelligence feeds provide real-time updates on indicators of compromise (IOCs), such as malicious IPs and URLs. Security researchers and organizations share IOCs with feed vendors, who then analyze and validate them before distributing...
Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence

Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence data based on domains and potentially on the IP address...
Find Malware With ANY RUN Threat Intelligence YARA Search by File Contents

Find Malware With ANY RUN Threat Intelligence YARA Search by File Contents

YARA is a rule-based malware detection tool that utilizes regular expressions and textual/binary signatures to create descriptions (rules) for identifying malicious files.  Within ANY.RUN TI, YARA Search allows you to write, edit, test, download, and...
New Redline Stealer Variant Leverages Lua Bytecode For Stealthiness

New Redline Stealer Variant Leverages Lua Bytecode For Stealthiness

Redline Stealer is a powerful information-stealing malware, and hackers often exploit this stealthy stealer to gain unauthorized access to a victim's sensitive data. Threat actors can steal many sensitive and valuable data by exploiting the...
Cyber Security News Weekly Round-Up

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)

Welcome to the Cyber Security News Weekly Round-Up. Each week, we will explore the latest cyber threats, vulnerabilities, and notable stories that have shaped the cybersecurity landscape. From sophisticated malware attacks to innovative phishing schemes,...
TOP 10 Emerging Cybersecurity Threats for 2030

TOP 10 Emerging Cybersecurity Threats for 2030

The European Union Agency for Cybersecurity (ENISA) has published a comprehensive list of the top ten emerging cybersecurity threats anticipated to impact the digital landscape by 2030. This forecast culminates an extensive eight-month foresight...
Fortifying Cyber Defenses – Exploring The Latest Innovations In Cybersecurity Software For 2024

Fortifying Cyber Defenses – Exploring The Latest Innovations In Cybersecurity Software For 2024

In the rapidly evolving and increasingly interconnected landscape of cybersecurity, staying ahead of emerging threats requires not only vigilance but also cutting-edge software solutions that can adapt, evolve and respond to the ever-growing complexity...

Managed WAF

Website

Latest News