Solving the Puzzle: Reversing the New Stealer Jigsaw
This report focuses on the threat intelligence gathered on the Jigsaw Stealer, a malicious software available for sale on a hacker’s forum.
Unraveling the Complex Infection Chain: Analysis of the SideCopy APT’s Attack
This report presents a list of Indicators of Compromise (IOCs) associated with the SideCopy APT Group’s infection chain. These IOCs, including file hashes, IP addresses, domain names, and other relevant artifacts, aid in the identification and detection of malicious activity.
From Slides to Threats: Transparent Tribe’s New Attack on Indian Government Entities Using Malicious PPT
In the vast landscape of cybersecurity threats, state-sponsored cyber espionage groups pose a significant challenge to national security.
Unraveling the Layers: Analysis of Kimsuky’s Multi-Staged Cyberattack
Introduction In recent developments within the realm of cybersecurity, an alarming revelation has come to light—an intricate and multi-staged attack campaign executed by the Kimsuky Advanced Persistent Threat (APT) group.
Moroccan Black Cyber Army claim Allegedly Claim Hack of government
Threat Attackers Allegedly Selling Forex Database
June’s Cyber Battleground: Decoding Ransomware and APT Attacks in Europe
ThreatMon, as a leading Cyber Threat Intelligence (CTI) firm, presented its comprehensive report on the Ransomware and Advanced Persistent Threat (APT) groups targeting Europe in June.
Threat Actor Allegedly Claiming Leak of Smart Buy Database
Technical Analysis of RDPCredentialStealer: Uncovering Malware Targeting RDP Credentials with API Hooking
This report provides a comprehensive technical analysis of the RDPCredentialStealer malware, detailing its functionality, attack vectors, and potential impact.
Cyber Threat Report: Analyzing Ransomware and Apt Attacks Targeting Türkiye May 2023
ThreatMon, as a leading Cyber Threat Intelligence (CTI) firm, presents its comprehensive report on the Ransomware and Advanced Persistent Threat (APT) groups targeting Türkiye in May. This report aims to provide valuable insights intothe evolving threat landscape,highlighting the activities and tactics employed by these malicious entities.