Wednesday, January 29, 2025

THREATS

Operation Oxidovy, Threat Actors Targeting Government And Military Officials

The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a batch script.The LNK runs...

AWS Launches Mithra To Detect Malicious Domains Across Systems

Amazon's e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework.Amazon, which has a vast online presence covering multiple domains...

Exodus Underground Market Place Emerging As A Heaven For Cybercriminals

The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy.The user "ExodusMarket" originally announced...

SSLoad Malware Employs MSI Installer To Kick-Start Delivery Chain

Malware distributors use MSI installers as Windows OS already trusts them to run with administrative rights by bypassing security controls.For this reason, MSI files...

Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence...

What is Global Threat Intelligence? – SOC/DFIR Team Guide

Global threat intelligence (GTI) is crucial for cybersecurity as it offers real-time data on emerging and persistent cyber threats worldwide.Threats can originate anywhere,...

New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data

In recent years, personal data security has surged in importance due to digital device usage. Side-channel attacks exploit system side effects to gather information. Electronic...

RA World Ransomware Attack Windows Using Hacked Domain Control & Anti-AV Tactics

Threat actors use hacked domain control to host malicious content by leveraging legitimate domains to evade detection by security measures. Anti-AV tactics are employed to...