Threat Detection

Creating An AI Honeypot To Engage With Attackers SophisticatedlyCreating An AI Honeypot To Engage With Attackers Sophisticatedly

Creating An AI Honeypot To Engage With Attackers Sophisticatedly

Honeypots, decoy systems, detect and analyze malicious activity by coming in various forms and can be deployed on cloud platforms…

7 months ago
ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP BackdoorToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor

ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor

ToddyCat is an APT group that has been active since December 2020, and primarily it targets the government and military…

7 months ago
HardBit Ransomware Using Passphrase Protection To Evade DetectionHardBit Ransomware Using Passphrase Protection To Evade Detection

HardBit Ransomware Using Passphrase Protection To Evade Detection

In 2022, HardBit Ransomware emerged as version 4.0. Unlike typical ransomware groups, this ransomware doesn't use leak sites or double…

9 months ago
Hackers Attacking Vaults, Buckets, And Secrets To Steal DataHackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins,…

10 months ago