From Code to Threat Intel: How GitHub Monitoring Enhances Security Postures

Blog From Code to Threat Intel: How GitHub Monitoring Enhances Security Postures In today’s interconnected digital world, platforms like GitHub have become indispensable for developers. They enable seamless collaboration, effective version control, and streamlined continuous integration and deployment (CI/CD) processes. However, this accessibility and openness also make these platforms attractive targets for cybercriminals. These bad actors exploit […]
Kematian Stealer Technical Analysis

Blog In the ever-evolving world of cybersecurity, new threats emerge constantly, challenging our defenses and requiring continuous vigilance. One such threat that has recently come to light is the “Kematian Stealer,” an advanced information-stealing malware. ThreatMon’s Kematian Stealer Technical Analysis Report aims to provide an in-depth analysis of this potent malware, its features, and the […]
CrowdStrike Incident Leveraged for Malware Delivery, Phishing, Scams
CrowdStrike Update Halts the Systems: CyberSpace Ripple Effect

Blog CrowdStrike update 1.CrowdStrike Windows Outage: What Happened? A recent CrowdStrike update caused severe disruptions, including high CPU usage on macOS systems and the Blue Screen of Death (BSOD) on Windows systems. These issues affected hundreds of systems globally, leading to operational standstills in various sectors, including broadcasting, aviation, and transportation. 2. When Did the […]
Top 10 Phishing Techniques You Need to Know in 2024

Blog phishing techniques Top 10 Phishing Techniques You Need to Know in 2024 Phishing attacks use increasingly sophisticated techniques bolstered by cutting-edge technology and are increasingly effective at outfoxing all but the most discerning individuals and companies. In this blog post, we provide an in-depth look at the top 10 phishing techniques currently in use, […]
Clarification Statement Regarding Dark Power and Volt Typhoon

ThreatMon At ThreatMon, we are proud to have a strong research team that actively monitors cyber threats. Our team took the Dark Power group, which attracted attention with its attacks on aid organizations after the earthquake in Turkey and Syria on February 6, 2023, into its radar and conducted a comprehensive research on it. Initial […]
Chinese cyber agency accused of ‘false and baseless’ claims about US interfering
Global Cyber Threat Report Mid-Year 2024

Blog What will cybersecurity look like by the midpoint of 2024? The evolving landscape during the first half of the year showed us all. ThreatMon’s 2024 Mid-Year Global Cyber Threat Report outlines a clear picture of the key threats, trends, and attacks that define the cyber landscape. This Report details the findings and incident timeline […]