Threat Bounty Program Digest — July 2024 Results
Detection Content Creation, Submission & Release Members of the Threat Bounty community continue to explore and leverage the potential of…
Detection Content Creation, Submission & Release Members of the Threat Bounty community continue to explore and leverage the potential of…
Following in-the-wild attacks exploiting CVE-2024-37085 by diverse ransomware gangs, defenders encounter a new variant of the nefarious Proton ransomware family…
The nefarious russian state-sponsored APT28 hacking collective, also known as Fighting Ursa, is coming into the spotlight. Since early spring…
A couple of weeks after the disclosure of CVE-2024-38112, a critical vulnerability exploited by the Void Banshee group to deploy…
The FBI, CISA, and leading cybersecurity authorities have issued a warning over growing North Korean cyber-espionage operations linked to the…
The vulnerability management lifecycle is an essential process for defending against the escalating number of cyber threats in our modern…
Cybersecurity researchers have recently observed a new cyber attack on a Latin American airline leveraging Akira ransomware. The attackers took…
Leveraging public email services along with corporate email accounts is a common practice among government employees, military personnel, and the…
Defenders have observed a sudden surge in the adversary activity of the UAC-0057 hacking group targeting Ukrainian local government agencies.…
Since the outbreak of the full-scale war in Ukraine, cyber defenders have identified the growing volumes of cyber-espionage campaigns aimed…