|
You are here |
blog.eclecticiq.com | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | By Flavio Costa, * In a recent customer engagement, we observed a month-long AvosLocker campaign. * The attackers utilized several different tools, including Cobalt Strike, Sliver and multiple commercial network scanners. * The initial ingress point in this incident was a pair of VMWare Horizon Unified Access Gateways that were vulnerable to Log4Shell. | |
| | | | |
www.cybereason.com
|
|
| | | | | Email extortion campaign by threat actor group CL0P targets e-business suite users under CVE-2025-61882 | |
| | | | |
blog.checkpoint.com
|
|
| | | | | As 2024 ended, a new name surged to the top of the cyber threat charts: FunkSec. Emerging as a leading ransomware-as-a-service (RaaS) actor, FunkSec made | |
| | | | |
blog.dingusxmcgee.com
|
|
| | | Today I was reviewing High and Critical detections for the entire org. | ||