Network traffic analysis often reveals hidden artifacts, including images transferred over HTTP. These images can contain valuable...
cybersecurity
Security teams at enterprise organizations can leverage Shodan’s command-line interface (CLI) to enhance external threat intelligence gathering....
Security professionals often deal with large log files that can be cumbersome to analyze. The csplit utility...
The security operations center (SOC) is undergoing a radical transformation through AI and cloud-native detection technologies. Traditional...
A new variant of the POWLOAD Trojan has emerged, leveraging COVID-19 themes to target Italian users through...
A new malware campaign has been identified distributing trojanized versions of Zoom installers bundled with cryptocurrency mining...
A newly identified backdoor malware, Backdoor.Win32.DEVILSHADOW.THEAABO, has been discovered embedded in counterfeit Zoom installer packages. This threat...
Backdoor.MSIL.BLADABINDI.THA represents a concerning Windows-based backdoor malware that security teams should monitor, particularly due to its recent...
Trojan.MSIL.SUPERNOVA.A represents a significant Windows-based threat with high damage potential despite its currently limited distribution. First identified...
Trojan.INF.HIDDENTEAR.THAOGBA is a Windows-based Trojan classified as low-risk by Trend Micro. It spreads through malicious downloads or...
Summary: Ransom.MSIL.COBRALOCKER.AA represents a Windows-targeting ransomware strain first identified in January 2021, demonstrating low distribution but high...
Security teams should be aware of PUA.Win64.ProcHack.AC, a Potentially Unwanted Application (PUA) targeting Windows systems that represents...
Trojan.Win64.COMBACKER.YABA-A represents a persistent though low-risk threat to Windows systems, first identified in January 2021 by Trend...
Ransom.MSIL.THANOS.THABGBA is a ransomware strain targeting Windows systems, classified as a low-risk threat due to its limited...
Trojan.MacOS.SLISP.A (also known as SilverSparrow) represents a sophisticated macOS threat with concerning data exfiltration capabilities. First identified...
The Trojan.Win64.HAFNIUM.A malware represents a sophisticated threat targeting Microsoft Exchange servers, initially attributed to the Chinese state-sponsored...
The Ransom.Win64.ASTROLOCKER.THCBDBA ransomware represents a moderate-risk threat with high damage potential, primarily targeting Windows environments. First documented...
TrojanSpy.MSIL.REDLINESTEALER.YXBDM represents a sophisticated information-stealing malware targeting Windows systems, first identified by Trend Micro researchers in April...
TrojanSpy.MSIL.REDLINESTEALER.YXBDN represents a sophisticated Windows-based information stealer with demonstrated capabilities in credential harvesting across multiple applications. First...
The ransomware variant Ransom.Win32.SODINOKIBI.YABGC (a member of the REvil/Sodinokibi family) poses a significant threat to Windows environments...