What Is Threat Intelligence? Threats At least for two decades, we have been witnessing relentless… rooter June 21, 2024 10 min read 0
UNC3886: Novel China-Nexus Cyber-Espionage Threat Actor Exploits Fortinet & VMware Zero-Days, Custom Malware for Long-Term Spying Threats In Q1 2024, Advanced Persistent Threat (APT) groups from China,… rooter June 20, 2024 4 min read 0
Velvet Ant Activity Detection: China-Backed Cyber-Espionage Group Launches a Prolonged Attack Using Malware Deployed on the F5 BIG-IP Devices Threats The China-linked cyber-espionage group Velvet Ant has been infiltrating F5… rooter June 18, 2024 4 min read 0
The New Era of Threat Bounty Program Threats How Crowdsourcing Shapes Future Cyber Defense Strategies Crowdsourcing is one… rooter June 18, 2024 9 min read 0
TellYouThePass Ransomware Attack Detection: Hackers Exploit CVE-2024-4577 to Install Web Shells and Drop Malware Threats The TellYouThePass ransomware operators have been spotted behind a novel… rooter June 13, 2024 3 min read 0
CVE-2024-4577 Detection: A New Easy-to-Exploit PHP Vulnerability Could Lead to RCE Threats Hot on the heels of the disclosure of CVE-2024-29849 and… rooter June 12, 2024 3 min read 0
CVE-2024-29849 Detection: A Critical Auth Bypass In Veeam Backup Enterprise Manager Threats Another day, another threat on the radar challenging cyber defenders.… rooter June 11, 2024 3 min read 0
SOC Prime Introduces a Fair Usage Policy Threats Make the Most of Advanced Threat Detection at No Extra… rooter June 11, 2024 8 min read 0
Threat Bounty Program Digest — May 2024 Results Threats Publications In May, our content verification team received more than… rooter June 7, 2024 4 min read 0
UAC-0020 aka Vermin Attack Detection: SickSync Campaign Using SPECTR Malware and SyncThing Utility to Target the Armed Forces of Ukraine Threats The Vermin hacking group, also known as UAC-0020, resurfaces, targeting… rooter June 7, 2024 5 min read 0