Tag:
Threat Intelligence
Cyber Attack
TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data
The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data, exfiltrates sensitive information, and...
Cyber Attack
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks
Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit newly discovered vulnerabilities. Staying ahead...
Amazon AWS
AWS Launches Mithra To Detect Malicious Domains Across Systems
Amazon's e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework.Amazon, which has a vast online presence covering multiple domains...
Cyber Crime
Exodus Underground Market Place Emerging As A Heaven For Cybercriminals
The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy.The user "ExodusMarket" originally announced...
CVE/vulnerability
MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets
MirrorFace threat actors have been targeting media, political organizations, and academic institutions since 2022, shifting focus to manufacturers and research institutions in 2023. The attack...
Cyber Attack
Chinese Winnti Group Intensifies Financially Motivated Attacks
Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential of monetizing the stolen data, ransoms, and fraudulent activities.The digital...
Security Tools
Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals
Threat Intelligence and endpoint Security Tools are more often used by security industries to test the vulnerabilities in networks and applications.Here you can find...
Computer Security
SOC Fourth Defense Phase – Cyber Threat Intelligence Guide
Cyber Threat intelligence is one of the most critical concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage activities; the...