Cyber Threats to the US Elections

This image relates to cyber threats to the US elections.

Blog As the US heads toward its presidential election in 2024, a cyber attack hangs over the voting process. As foreign and domestic actors try to interfere with electoral processes, cybersecurity is now a tricky area more than ever. A new wave of cyberattacks reveals how those threats are shifting:  Information stolen from the California […]

Kematian Stealer Technical Analysis Report

Kematian Stealer is a PowerShell-based stealer malware tool designed to infiltrate and extract data from Windows systems effortlessly. Despite being open-source and not for financial gain, it was developed by six contributors who participated in the project’s release. Kematian Stealer showcases its advanced level with its features and included builder software.

As ThreatMon, we strive to prevent potential malicious activities by informing individuals, companies, firms, institutions, and organizations about current threats through our reports, posts, and analyses.

AzzaSec Ransomware Technical Analysis Report

As ThreatMon, we strive to prevent potential malicious activities by informing individuals, companies, firms, institutions, and organizations about current threats through our reports, posts, and analyses.

GLOBAL CYBER THREAT REPORT 2024 H1

ThreatMon analyzes the threat landscape based on its extensive and
detailed data covering most active dark web forums and ransomware
groups’ sites, the activities of most prominent threat actors, the
vulnerability threat landscape, most used malware by threat actors,
important breaches, and millions of stealer log data to present you
insights into the the global threat landscape in the first half of 2024.

Understanding the ‘Kapeka’ Backdoor: Detailed Analysis by APT44

Kapeka Backdoor is a sophisticated malware that prepares a platform for malware execution by communicating with infected devices. Through command-and-control (C2) communication, attackers can send commands and take control of target systems. This backdoor is similar to another backdoor known as QUEUESEED, which has the same hash and characteristics. Both malware have been attributed to the Russian APT group Sandworm.

XZ Utils Backdoor CVE-2024-3094

The discovery of the XZ Backdoor vulnerability has shaken the cybersecurity community. It revealed a serious breach with significant implications for the security of open-source software. This troubling discovery began with seemingly harmless contributions to the widely used compression tool XZ Utils.