Zola Ransomware Detection: Proton Family Evolves with a New Ransomware Variant Featuring a Kill Switch Threats Following in-the-wild attacks exploiting CVE-2024-37085 by diverse ransomware gangs, defenders… rooter August 7, 2024 4 min read 0
Fighting Ursa (aka APT28) Attack Detection: Adversaries Target Diplomats Using a Car for Sale as a Phishing Lure to Spread HeadLace Malware Threats The nefarious russian state-sponsored APT28 hacking collective, also known as… rooter August 5, 2024 4 min read 0
CVE-2024-37085 Detection: Ransomware Groups Actively Exploit a Newly Patched Vulnerability in VMware ESXi Hypervisors to Gain Full Administrative Privileges Threats A couple of weeks after the disclosure of CVE-2024-38112, a… rooter July 30, 2024 4 min read 0
Andariel Attack Detection: FBA, CISA, and Partners Warn of an Increasing Global Cyber-Espionage Campaign Linked to the North Korean State-Sponsored Group Threats The FBI, CISA, and leading cybersecurity authorities have issued a… rooter July 29, 2024 5 min read 0
What Is the Vulnerability Management Lifecycle? Threats The vulnerability management lifecycle is an essential process for defending… rooter July 26, 2024 10 min read 0
Akira Ransomware Group Is on the Rise: Hackers Target the Airline Industry in LATAM Threats Cybersecurity researchers have recently observed a new cyber attack on… rooter July 26, 2024 4 min read 0
UAC-0102 Phishing Attack Detection: Hackers Steal Authentication Data Impersonating the UKR.NET Web Service Threats Leveraging public email services along with corporate email accounts is… rooter July 26, 2024 4 min read 0
UAC-0057 Attack Detection: A Surge in Adversary Activity Distributing PICASSOLOADER and Cobalt Strike Beacon Threats Defenders have observed a sudden surge in the adversary activity… rooter July 25, 2024 4 min read 0
UAC-0063 Attack Detection: Hackers Target Ukrainian Research Institutions Using HATVIBE, CHERRYSPY, and CVE-2024-23692 Threats Since the outbreak of the full-scale war in Ukraine, cyber… rooter July 23, 2024 5 min read 0
UAC-0180 Targets Defense Contractors in Ukraine Using GLUEEGG, DROPCLUE, and ATERA Threats According to Accenture research, around 97% organizations experienced a surge… rooter July 18, 2024 4 min read 0