UAC-0180 Targets Defense Contractors in Ukraine Using GLUEEGG, DROPCLUE, and ATERA
According to Accenture research, around 97% organizations experienced a surge in cyber threats since the onset of the russia-Ukraine war…
According to Accenture research, around 97% organizations experienced a surge in cyber threats since the onset of the russia-Ukraine war…
Detection Content Submission & Release In June, SOC Prime’s Threat Bounty Program members started using Uncoder AI to create, validate,…
Following Microsoft’s recent Patch Tuesday update, which addressed the CVE-2024-38112 vulnerability, researchers uncovered a sophisticated campaign by the Void Banshee…
Defenders have been observing a DarkGate malware campaign in which adversaries have taken advantage of Microsoft Excel files to spread…
Today, we want to tell you the story of Kyaw Pyiyt Htet, the content author who has been with the…
Since early spring 2024, the notorious North Korea-linked hacking collective tracked as Kimsuky APT has been launching a targeted campaign…
The latest advisory issued by law enforcement agencies within Australia, the U.S., Canada, Germany, the U.K., New Zealand, South Korea,…
New ransomware maintainers have rapidly emerged in the cyber threat arena, employing innovative locker malware and a variety of detection…
The nefarious North Korea-linked threat actor known as Kimsuky APT group uses a novel malicious Google Chrome extension dubbed “TRANSLATEXT”…
The cyber threat landscape in June is heating up, largely due to the disclosure of new vulnerabilities, such as CVE-2024-4577…