Ransom.Win64.CONTI.AA, a variant of the notorious Conti ransomware family, remains a significant threat to Windows systems despite...
Blue-Team
The latest in malware analysis, threat intelligence, cybersecurity reports, SIEM intelligence, and more Blue-Team news.
Trojan.W97M.EMOTET.SMI is a variant of the notorious Emotet malware, primarily spread through malicious Microsoft Office documents. Despite...
Ransom.MSIL.EGOGEN.THEBBBC is a ransomware strain targeting Windows systems, classified as low-risk in terms of distribution but with...
Ransom.Win32.NOKO.THDABBC is a ransomware strain targeting Windows systems, classified as low risk due to its limited distribution...
Ransom.Win32.SPOOSH.THGAGBC is a Windows-targeting ransomware strain first documented by Trend Micro in July 2023. While classified as...
A recent investigation by Trend Micro’s Managed XDR team uncovered a sophisticated web shell attack targeting Internet...
Following an international law enforcement takedown of the RedLine Stealer malware-as-a-service (MaaS) operation in October 2024, ESET...
Zoho Corporation has addressed a medium-severity authentication vulnerability (CVE-2025-1723) in ManageEngine ADSelfService Plus versions 6510 and earlier....
Microsoft has recently addressed several critical vulnerabilities in its Azure platform, as reported by the Dutch National...
On March 12, 2025, Ivanti announced the resolution of a critical vulnerability in its Ivanti Secure Access...
A critical vulnerability (CVE-2025-23120) in Veeam Backup & Replication has been addressed by the vendor. The flaw,...
The global outage caused by a faulty update from CrowdStrike has led to significant disruptions for organizations...
Ransomware attacks continue to be a significant threat to organizations worldwide, but many of these incidents can...
TL;DR Malicious macros remain a significant threat, with Microsoft Office being a common attack vector. Updated guidance...
The UK’s National Cyber Security Centre (NCSC) has introduced a groundbreaking initiative called the ‘Share and Defend’...
In the ever-evolving landscape of cybersecurity, logging is a cornerstone of effective security monitoring and incident response....
In today’s rapidly evolving cybersecurity landscape, vulnerability scanning has become a cornerstone of effective security management. With...
In today’s interconnected world, the lifecycle of network devices—from acquisition to disposal—plays a critical role in maintaining...
In today’s increasingly remote and mobile workforce, securing end-user devices has become a critical challenge for organizations....
In the ever-evolving landscape of cybersecurity, phishing attacks remain one of the most pervasive threats to organizations...