Events2Join

Phishing Campaigns Employ New Python RAT Malware to Target ...


PondRAT Malware Targets Linux and macOS Python Developers in ...

PondRAT, a Remote Access Trojan (RAT) associated with the North Korean APT group Gleaming Pisces, has been deployed through malicious Python packages available ...

BlackBerry Quarterly Global Threat Report — September 2024

The latest report by the BlackBerry Threat Research and Intelligence team provides actionable and contextualized cyber intelligence to increase your ...

Gen Q2/2024 Threat Report

This quarter—April through June 2024—continued to highlight the relentless nature of cyber threats, with a staggering 46% increase in attacks ...

A new Python-based RAT controlled by Evilnum hackers is targeting ...

NPAV recommends users and financial sector workers to keep their guard up against phishing emails. Users must refrain themselves from ...

Mythic Leopard APT Group - Brandefense

Mythic Leopard is a suspected Pakistan-based threat group that has been active since at least 2013, primarily targeting diplomatic, defense, and research ...

FIN7: Silent Push unearths the largest group of FIN7 domains ever ...

4000+ IOFA domains and IPs found. Louvre, Meta, and Reuters targeted in massive global phishing and malware campaigns. threat. July 10, 2024.

PondRAT: The Growing Threat of North Korean Malware

Safeguard your data from North Korean malware threats with our advanced cybersecurity solutions. Protect your sensitive information now!

Perception Point - Cyware Social

Cyber News - Check out top news and articles about cyber security, malware attack updates and more at Cyware.com. Our machine learning based curation engine ...

APT & CyberCriminal Campaign Collection - GitHub

This is collections of APT and cybercriminals campaign. Please fire issue to me if any lost APT/Malware events/campaigns.

Attackers Abuse Cloudflare Tunnels to Deliver Xworm Malware

The attack's abuse of Cloudflare Tunnels is part of an overall increase in malware delivery via this vector, said researchers.

Cyber Threat Report | September 2020 - AMATAS

In this edition of the newsletter we will cover: Ransomware trend; Other cyber trends; Phishing campaigns; Evolving tactics, techniques, and ...

User Execution: Malicious File, Sub-technique T1204.002 - Enterprise

An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file.

Cybersecurity threatscape: Q1 2024 - Positive Technologies

Attackers more frequently used malware against individuals: the share of such incidents increased by 9% compared to the previous quarter, ...

Transparent Tribe: Threat Actor Profile - Cyble

Transparent Tribe primarily targets Indian government organizations, military personnel, and defense contractors. Its objective is usually to gather sensitive ...

Common Malware Loaders - ReliaQuest

Table of contents. QakBot: Top Threat to Takedown; The Latest in the Threat Landscape; 2024's Malware Loader Heavyweights; Noteworthy Malware ...

TryCloudflare Exploited In Malicious Campaigns Spreading Malware

Hackers exploited TryCloudflare in multiple malicious campaigns to deliver different RATs, recently spreading the Xworm malware.

Cybersecurity Study Uncovers Key Malware Attack Trends

Security firm Positive Technologies has released a report on the current cyber threats. Learn about the key trends from the report.

Threat Pulse - January 2023 - DigitalXRAID

Research has been conducted into ALLANITE, a suspected Russian cyber espionage group, that has primarily targeted the electric utility sector within the United ...

Evilnum group's Python-based RAT impersonates legitimate programs

Evilnum ATP hacker group change tactics and targets financial firms with new Python-based malware. The Advanced Persistent Threat group ...

News | NICCS - CISA

Attention: The Federal Virtual Training Environment (FedVTE) has been permanently decommissioned. CISA Learning will be available soon for external users!