Technical Analysis of RDPCredentialStealer: Uncovering Malware Targeting RDP Credentials with API Hooking

This report provides a comprehensive technical analysis of the RDPCredentialStealer malware, detailing its functionality, attack vectors, and potential impact.
Cyber Threat Report: Analyzing Ransomware and Apt Attacks Targeting Türkiye May 2023

ThreatMon, as a leading Cyber Threat Intelligence (CTI) firm, presents its comprehensive report on the Ransomware and Advanced Persistent Threat (APT) groups targeting Türkiye in May. This report aims to provide valuable insights intothe evolving threat landscape,highlighting the activities and tactics employed by these malicious entities.
Rivalry between Hacking, Competition to prove the talent
Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations

The realm of cyberspace is fraught with ever-evolving threats, and Advanced Persistent Threat (APT) groups pose a significant risk to the security and stability of nations and international organizations.
The Rise of Dark Power: A Close Look at the Group and their Ransomware

Ransomware has become increasingly prevalent in recent years, with cybercriminals targeting individuals and organizations alike.
Chinotto Backdoor: Technical Analysis of the APT Reaper’s Powerful Weapon

In this report, we analyzed new techniques used by the Backdoor of the Reaper APT Group. Compare to old variants, it can now log your keystrokes, take screenshots and more.
Noname05716 In Depth Analysis on The Roles of Threat Actors and Attacks

Our report, in which we made a detailed analysis of the Threat Actors and Hacker Groups that took an active role in the Ukraine-Russia war, this time includes information on the “Noname057(16)” threat actor.
KillNet: In Depth Analysis on The Roles of Threat Actors and Attacks

In this Report, which examines the non-stop attacks of Threat Actors and Hacker Groups, as we have just completed the first year of the war between Ukraine and Russia, we have discussed the KillNet Hacker group.
Threat Actor Allegedly Claims Breach of Federal Bank Customer Data

ServiceNow Data Leak: Risks of Misconfigured Knowledge Bases

Blog ServiceNow Data Leak The ServiceNow Knowledge Base (KB) leak exposed sensitive corporate data from over 1,000 instances of the platform, largely due to misconfigured access controls. These KBs, used to store critical corporate data like PII, system credentials, and internal processes, were inadvertently exposed, giving unauthorized users access via public widgets. This widespread misconfiguration highlights ongoing […]