Interview with Threat Bounty Developer – PHYO PAING HTUN
Today, we want to introduce to the SOC Prime’s community a talented and devoted member of the Threat Bounty Program…
Today, we want to introduce to the SOC Prime’s community a talented and devoted member of the Threat Bounty Program…
The source code for Knight ransomware, a rebrand of Cyclops RaaS operation, is available for sale on a hacking forum.…
Close on the heels of a critical Jenkins RCE vulnerability, another security flaw that can pose a severe threat to…
Threat Bounty Content In January, the members of the Threat Bounty Program were very active in submitting detections for review…
Throughout 2023, the frequency and sophistication of attacks have increased along with the swift evolution and adoption of AI technology.…
The infamous North Korean state-sponsored hacking group Kimsuky APT has been spotted leveraging a newly discovered Golang-based information stealer tracked…
State-sponsored hackers acting on behalf of the Beijing government have been organizing offensive operations aimed at collecting intelligence and launching…
Cybersecurity researchers recently unveiled a new variant of a stealthy info-stealing malware known as Mispadu Stealer. Adversaries behind the latest…
In addition to the rising frequency of cyber attacks by the infamous UAC-0050 group targeting Ukraine, other hacking collectives are…
Threat Bounty Content Acceptance Since the launch of the Threat Bounty Program, SOC Prime has been providing skilled and enthusiastic…