Skip to content

Blog

Members Public

Cyber Threat Weekly #39

The week of August 12th through August 18th there were 478 cyber news articles in my feed.  A moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with extortion-based threat actors use a fake update screen to hide data theft. Threat actors continue to

Members Public

Cyber Threat Weekly – #38

The week of August 5th through August 11th was on the heavier side with 485 cyber news articles reviewed.  It was Blackhat and DefCon week, so, some interesting research to share in addition to the typical threat trends and adversarial behavior. Let’s start with 2.7 billion data records

Members Public

Cyber Threat Weekly – #37

The week of July 29th through August 4th, roughly 465 cyber news articles were reviewed.  Quite a bit of cyber threat trend and adversarial behavior news to share.  Let’s start with a rush of home users seeking help after ransomware infection. Threat actors use adversary-in-the-middle (AitM) at the ISP

Members Public

Cyber Threat Weekly – #36

The week of July 22nd through July 28th on the heavier side with 461 cyber news articles reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with ‘PKfail’ a secure boot cryptographic management fail from the supply chain. Malware-as-a-Service (MaaS) taken

Members Public

Cyber Threat Weekly – #35

The week of July 15th through July 21st was on the heavy side with 459 cyber news articles reviewed.  A medium amount of cyber threat trend and adversarial behavior news to share this week.  Let’s start with, surprise, threat actors targeting CrowdStrike customers with fake fixes. A new report,

Members Public

Cyber Threat Weekly – #34

The week of July 8th through 14th was somewhat heavy with 457 cyber news articles reviewed.  A large amount of cyber threat trend and adversarial behavior news to share.  Let’s start with a campaign targeting the NuGet repository focused on defense evasion. Threat actors utilize proof-of-concept (PoC) exploit code

Members Public

Cyber Threat Weekly – #33

The week of July 1st through July 7th was back down to 379 cyber news articles reviewed.  A relatively light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with an unprecedented password dump, nearly 10 billion unique passwords. HTTP File Server (HFS) Remote Code

Members Public

Cyber Threat Weekly – #32

The week of June 24th through June 30th picked up with 439 cyber news articles reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with Juniper releases fix for critical authentication bypass bug. Run pipelines as any user in GitLab, critical

Members Public

Cyber Threat Weekly – #31

The week of June 17th through June 23rd was lighter than usual with 342 cyber news articles reviewed.  Only a moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with the CDK Global IT outage caused by BlackSuit ransomware. Outdated Android phones targeted by

Members Public

Cyber Threat Weekly – #30

The week of June 10th through June 16th was a bit heavier with 407 cyber news articles reviewed.  Quite a bit of cyber threat trend and adversarial behavior news to share.  Let’s start with a new Linux malware controlled through Discord emojis. Poisoning ML models via pickle files.  Black