CVE-2023-38831 Detection: UAC-0057 Group Exploits a WinRAR Zero-Day to Spread a PicassoLoader Variant and CobaltStrike Beacon via Rabbit Algorithm Threats The UAC-0057 hacking collective, aka GhostWriter, reemerges in the cyber… rooter September 1, 2023 4 min read 0
Junos OS Vulnerabilities Exploit Detection: Hackers Leverage CVE-2023-36844 RCE Bug Chain Abusing Juniper Devices After PoC Release Threats Adversaries weaponize four newly discovered RCE security flaws in the… rooter August 31, 2023 3 min read 0
UAC-0173 Attacks: Ukrainian Judicial Bodies and Notary Massively Targeted With AsyncRAT Malware Threats Cybersecurity experts observe significantly growing volumes of malicious activity aimed… rooter August 28, 2023 4 min read 0
SOC Prime on Discord: Join a Single Community for All Cyber Defenders to Benefit from Shared Expertise Threats In February 2023, SOC Prime launched its Discord server community… rooter August 23, 2023 3 min read 0
Detect Cuba Ransomware Threat Group Infections: New Tooling Applied in Attacks Against Critical Infrastructure Organizations in the U.S. Threats Being active since 2019, Cuba ransomware operators constantly evolve their… rooter August 22, 2023 5 min read 0
CVE-2023-3519 Detection: RCE Zero-Day in Citrix NetScaler ADC and NetScaler Gateway Exploited in the Wild Threats Heads up! Cybersecurity experts notify defenders of a zero-day flaw… rooter August 18, 2023 3 min read 0
Adversaries Use Weaponized PDFs Disguised as German Embassy Lures to Spread Duke Malware Variant in Attacks Against Ministries of Foreign Affairs of NATO-Aligned Countries Threats Cybersecurity researchers have observed a new malicious campaign targeting Ministries… rooter August 15, 2023 4 min read 0
Okta & Splunk Integration Guide Threats In today’s world of rapidly evolving technologies, organizations are facing… rooter August 14, 2023 6 min read 0
New MerlinAgent Open-Source Tool Used by UAC-0154 Group to Target Ukrainian State Agencies Threats Cyber defenders observe growing volumes of cyber attacks against Ukraine… rooter August 7, 2023 5 min read 0
Google AMP Exploited in Phishing Attacks Targeting Enterprise Users Threats Phishing remains one of the most prevalent attacker techniques as… rooter August 4, 2023 3 min read 0