Skip to content

Blog

Members Public

Cyber Threat Weekly – #19

The week of March 25th through March 31st was on the lighter side of average with 438 cyber news articles reviewed.  A relatively light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with a tool that fuels cybercrime and nation state anonymity utilizing cheap

Members Public

Cyber Threat Weekly – #18

The week of March 18th through March 24th was what seems to be around average now with 456 cyber news articles reviewed.  This week attempted to be more selective on cyber threat trend and adversarial behavior news shared.  Still a large newsletter. Would love to hear your feedback. Let’s

Members Public

Cyber Threat Weekly – #17

The week of March 11th through March 17th was about average with 454 cyber news articles reviewed.  Only a moderate amount of cyber threat trend and adversarial behavior news.  Let’s start with threat actors deploying n-day exploits and dropping Linux remote access trojan (RAT). Component Object Model (COM) objects

Members Public

Cyber Threat Weekly – #16

The week of March 4th through March 10th was a bit light with 456 cyber news articles combed through.  Still a decent amount of cyber threat trend and adversarial behavior news.  Let’s start with cybercriminals observed switching TTPs quickly to maintain effectiveness. Web browser credential dumping is picking up

Members Public

Cyber Threat Weekly – #15

With 507 cyber news articles, the week of February 26th to March 3rd was moderately heavy on threat trends and adversary behavioral patterns.  Let’s start with Russian threat actors target cloud infrastructure.  Attackers use unsupported CMS editor to facilitate SEO poisoning.  Major brands subdomains hijacked for massive spam campaign.

Members Public

Cyber Threat Weekly – #14

With 458 cyber threat news articles, the week of February 19th to the 25th was relatively light in threat trends and adversary behavior news.  Let’s start with a carryover from last week, over 28,000 exchange servers vulnerable to now patched bug. Bricks WordPress theme under active exploitation.  Researchers

Members Public

Cyber Threat Weekly – #13

With 483 cyber news articles combed through, the week of February 12th to the 18th was interesting to say the least.  Let’s start with a new stealthy malware using reverse proxy tools.  Execs targeted with an Azure account hijacking campaign, still ongoing.  Keeping an eye on dark LLMs.  QR

Members Public

Cyber Threat Weekly – #12

The evolving threat landscape simply doesn’t slow down, although this is a relatively light week.  Let’s start with Ivanti and yet another vulnerability.  Researchers share 2023 Ransomware leak site analysis.  JetBrains critical bug allows an unauthenticated attacker to bypass authentication checks. Volt Typhoon uses small office home office

Members Public

Cyber Threat Weekly – #11

A busy week in threat news.  Let’s start with a new ZLoader variant emerges.  An exploration of Telegram’s dark markets and a phishing expedition.  Criminals actively target network operator’s credentials.  Scanning attempts of Atlassian Confluence RCE Bug. Discovery and analysis of a new DLL Loader.  GitLab releases

Members Public

Cyber Threat Weekly – #10

This week’s newsletter is a bit lighter than earlier this month, although news volumes continue to increase.  Let’s start with exploit attempts on the critical Atlassian Confluence bug disclosed last week.  First zero-day flaw of the year for Apple.  Digging deeper into a pair of malicious traffic direction