Threats

Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix

Epsilon Red ransomware

Following closely after the Interlock ransomware attacks that used a new custom RAT delivered through a modified ClickFix variant called FileFix, a new malicious campaign has emerged, also leveraging a ClickFix-themed malware delivery website. Defenders have uncovered a novel global Epsilon Red ransomware operation that began in July 2025, in which attackers use fake ClickFix […]

The post Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix appeared first on SOC Prime.

News & Updates

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to facilitate data exfiltration.
The activity, dubbed Operation CargoTalon, has been assigned to a threat cluster tracked as UNG0901 (short for Unknown Group 901).
“The campaign is aimed at targeting employees of Voronezh Aircraft Production Association (VASO), one
News & Updates

Arizona Woman Sentenced to 8 Years for Orchestrating $17 million North Korean Remote Work Scam

Arizona woman helped North Korean operatives land US remote tech jobs, laundering millions through a home-based “laptop farm.”

Cybercrime unveiled in the suburbs

Authorities sentenced an Arizona resident to over eight years in prison after discovering a covert “laptop farm” connected to a remote work scam involving North Korean IT operatives masquerading as American remote workers.

The case, which spanned three years, is one of the largest of its kind involving state-sponsored fraud linked t

Cybersecurity Tools

Why Threat Intelligence is the Missing Link in Your Cybersecurity Strategy

In the ever-evolving landscape of cyber threats, organizations are no longer asking if they’ll be targeted but when. Traditional cybersecurity measures, such as firewalls, antivirus software, and access control, remain essential. But they’re often reactive, responding only after a threat has emerged. In contrast, threat intelligence enables organizations to get ahead of the curve by […]

The post Why Threat Intelligence is the Missing Link in Your Cybersecurity Strategy appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Scroll to Top