New Features to Strengthen Your Cyber Defense

New Features to Strengthen Your Cyber Defense

Blog New Features to Strengthen Your Cyber Defense Cyber Defense 🧠 Brainify Risk Score: Smarter Scoring, Clearer Priorities Turn Alert Chaos into Executive-Grade Risk Clarity Our new Brainify Risk Score system brings a modular, explainable, and highly visual approach to risk analysis. It is structured across three intelligence layers to help security teams move from noise to insight: Core […]

2025: The Year Government Cybersecurity Reached a Breaking Point

2025: The Year Government Cybersecurity Reached a Breaking Point

Blog 2025: The Year Government Cybersecurity Reached a Breaking Point Government Cybersecurity The global government sector entered 2025 under unprecedented cyber pressure. ThreatMon’s latest intelligence analysis reveals that public institutions worldwide are facing a multidimensional threat landscape shaped by intense DDoS operations, identity-driven intrusions, expanding ransomware campaigns, and sophisticated state-sponsored espionage. This year’s data underscores […]

Geopolitical Cyber Tensions Are Intensifying

Geopolitical Cyber Tensions Are Intensifying

Blog Geopolitical Cyber Tensions Are Intensifying Geopolitical Cyber Tensions The global cyber landscape is shifting quickly. What used to be isolated incidents by small groups has evolved into a steady pattern of coordinated activity backed by nation states. Over the past week, several events have highlighted how deeply cyber operations are now connected to diplomacy, […]

When Cloudflare Falters, The Internet Feels It: What Today’s Outage Showed Us

When Cloudflare Falters, The Internet Feels It: What Today’s Outage Showed Us

Blog When Cloudflare Falters, The Internet Feels It: What Today’s Outage Showed Us When Cloudflare Falters On 18 November 2025, many users around the world woke up to a broken internet experience. Social platforms, AI tools, and other popular services started timing out or throwing error pages. A key reason is a problem inside Cloudflare’s […]

The Penn Data Breach: Why Donor Data Is the New Crown Jewel Target

The Penn Data Breach: Why Donor Data Is the New Crown Jewel Target

Blog The Penn Data Breach: Why Donor Data Is the New Crown Jewel Target The Penn Data Breach The University of Pennsylvania recently confirmed a cybersecurity incident that affected systems tied to alumni and donor information. While the full scope is still being determined, threat actors have claimed access to approximately 1.2 million records, including […]

The Inside Attack Surface: How Everyday Tools Become Cyber Weapons

The Inside Attack Surface: How Everyday Tools Become Cyber Weapons

Blog The Inside Attack Surface: How Everyday Tools Become Cyber Weapons Attack Surface Visibility in 2025 In today’s interconnected business world, the most dangerous cyber threats often don’t come from the outside. They originate within the organization itself — hidden in the tools employees use every day. ThreatMon’s new report, Invisible Attack, explores how unauthorized […]

A Global Turning Point in Cybersecurity: Inside the New UN Cybercrime Convention

A Global Turning Point in Cybersecurity: Inside the New UN Cybercrime Convention

Blog A Global Turning Point in Cybersecurity: Inside the New UN Cybercrime Convention Inside the New UN Cybercrime Convention The world has entered a new chapter in digital security. After years of debate, the United Nations has officially adopted and opened for signature the Convention against Cybercrime, a global agreement designed to coordinate how nations […]

F5 Breach: Inside the October 2025 Incident and What It Means for the Security Ecosystem

F5 Breach: Inside the October 2025 Incident and What It Means for the Security Ecosystem

Blog F5 Breach: Inside the October 2025 Incident and What It Means for the Security Ecosystem F5 Breach: Inside the October 2025 Incident In October 2025, F5 confirmed that a nation-state actor had gained long-term access to parts of its internal network, compromising systems that hold critical information about its products and engineering processes. The […]

Inside the Mind of Modern Attackers: 10 Advanced Tactics You Must Know

Inside the Mind of Modern Attackers: 10 Advanced Tactics You Must Know

Blog Inside the Mind of Modern Attackers: 10 Advanced Tactics You Must Know Inside the Mind of Modern Attackers The rules of cyber defense are changing. As security teams evolve their defenses, attackers are evolving even faster, replacing old-school malware with automated agents, creative phishing, and stealthy exfiltration techniques that hide in plain sight. This […]

A New Frontline: How Cyber Warfare Shaped the Military and Defense Landscape in 2025

A New Frontline: How Cyber Warfare Shaped the Military and Defense Landscape in 2025

Blog A New Frontline: How Cyber Warfare Shaped the Military and Defense Landscape in 2025 Cyber Warfare Shaped the Military and Defense Landscape in 2025 The first nine months of 2025 have made one thing clear: the battlefield is no longer just on land, sea, or air. It’s online.Military networks, defense contractors, and intelligence organizations […]

ENISA Threat Landscape 2025: What It Means for Cyber Defenders

Blog ENISA Threat Landscape 2025: What It Means for Cyber Defenders The European Union Agency for Cybersecurity (ENISA) has just released its annual Threat Landscape 2025 report. Covering July 2024 to June 2025, the study is a detailed snapshot of how Europe’s cyber environment has shifted over the past year. It’s a story of disruption […]

ThreatMon’s September 2025 Product Updates

ThreatMon’s September 2025 Product Updates

Blog ThreatMon’s September 2025 Product Updates New MSSP Dashboard & Program Enhancements Manage More Clients. Deliver More Value. Our MSSP Program has already helped providers scale their services with flexibility and speed. This month, we are introducing a major upgrade to the MSSP experience — both on the platform and in how we partner with […]

A Cyberattack Grounded Europe’s Airports: What Really Happened

A Cyberattack Grounded Europe’s Airports: What Really Happened

Blog A Cyberattack Grounded Europe’s Airports: What Really Happened When a cyberattack hits an airport, the ripple effects are immediate. Thousands of passengers stranded, airlines scrambling, and national infrastructure tested. That is exactly what Europe witnessed on September 19, 2025, when a disruption at a key service provider knocked out check-in and boarding systems at […]

Fraud Horizon: How AI Is Redefining the Global Fraud Landscape

Fraud Horizon: How AI Is Redefining the Global Fraud Landscape

Blog Fraud Horizon: How AI Is Redefining the Global Fraud Landscape Artificial intelligence (AI) has moved from being a driver of innovation to becoming a weapon in the hands of cybercriminals. Fraud, once associated with simple phishing emails or fake bank checks, has now evolved into a sophisticated ecosystem powered by deepfakes, synthetic voices, and […]

Why You Can’t Afford to Ignore Supply Chain Risk

Why You Can’t Afford to Ignore Supply Chain Risk

Blog Why You Can’t Afford to Ignore Supply Chain Risk Supply chains are no longer just about logistics. In recent years, they’ve become one of the fastest-growing attack surfaces in cybersecurity. According to Marsh, 73% of organizations underline their third parties have more access to organizational data assets than three years ago, and this trend […]

Mapped and Monetized ThreatMon’s Data-Driven Look at Initial Access Brokers

Mapped and Monetized ThreatMon’s Data-Driven Look at Initial Access Brokers

Blog Mapped and Monetized ThreatMon’s Data-Driven Look at Initial Access Brokers As the cyber threat landscape continues to evolve, one segment has rapidly industrialized: Initial Access Brokerage (IAB). These cybercriminals specialize in compromising and reselling unauthorized access to corporate networks, VPNs, RDPs, CMS platforms, and email servers—fueling ransomware, data theft, and espionage across the globe.Between […]

Turkiye’s Cybersecurity Outlook: Key Insights From the 2025 National Cyber Threat Report

Turkiye’s Cybersecurity

Blog The 2025 National Cyber Threat Report provides a comprehensive analysis of the Turkiye’s cybersecurity environment. Turkiye’s Cybersecurity Outlook Key Insights Turkiye is rapidly transforming into a critical player in the global digital landscape. However, this advancement comes with heightened cybersecurity risks. The 2025 National Cyber Threat Report provides a comprehensive analysis of the growing […]

From Cost-Efficiency to Cyber Threats: The Complex World of DeepSeek

From Cost-Efficiency to Cyber Threats: The Complex World of DeepSeek

Blog DeepSeek has rapidly emerged as a formidable Chinese AI contender, shaking up the global technology landscape with performance levels that rival OpenAI’s flagship models yet at a fraction of the cost. While its core appeal lies in efficiency and innovative technical architecture, DeepSeek’s rapid ascent has come hand-in-hand with a set of security, privacy, […]

A New Era in Cyber Defense: Unpacking the Impacts of Biden’s Cybersecurity Directive

A New Era in Cyber Defense: Unpacking the Impacts of Biden's Cybersecurity Directive

Blog A New Era in Cyber Defense: Unpacking the Impacts of Biden’s Cybersecurity Directive Joe Biden even made a full-scale executive order to upgrade the US cybersecurity system in the last days of his presidency. This executive order (Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity) addresses the rise in the number […]

2024 in Cybersecurity: Top Threats and Lessons from Our Global Report

2024 in Cybersecurity: Top Threats and Lessons from Our Global Report

Blog 2024 in Cybersecurity Cybersecurity with ThreatMon’s in-depth assessment: The cyber threat environment in 2024 was characterized by a significant increase in ransomware attacks, dark web operations, and data breaches aimed at essential industries globally. ThreatMon’s in-depth assessment provides essential understanding of these changing threats and highlights the necessity of strong cybersecurity practices. Unmatched Data […]

Data Leaks at Scale: The Gravy Analytics Breach and Its Ripple Effects

Data Leaks at Scale: The Gravy Analytics Breach and Its Ripple Effects

Blog Data Leaks at Scale: The Gravy Analytics Breach and Its Ripple Effects Data is the currency of the digital age and the business of entrepreneurship. But power comes at a cost: the potential for exploitation. The recent hack of Gravy Analytics, a location data powerhouse, demonstrated just how vulnerable sensitive data can be. This […]

Miyako: An Emerging Threat Actor with Advanced Capabilities

Miyako: An Emerging Threat Actor with Advanced Capabilities

Blog Miyako is a sophisticated, new threat actor, recently making waves for cyber attacks on critical infrastructure, financial institutions, and governments across the globe. In this article, we’ll look at the special features, operations, motivations, and consequences of Miyako’s actions, as well as ways that organizations can prevent such risk from this sophisticated threat actor. […]

Cyber Threats to the US Elections

This image relates to cyber threats to the US elections.

Blog Cyber Threats to the US Elections As the US heads toward its presidential election in 2024, a cyber attack hangs over the voting process. As foreign and domestic actors try to interfere with electoral processes, cybersecurity is now a tricky area more than ever. A new wave of cyberattacks reveals how those threats are […]

Cyber Street’s Nightmare: Halloween Exposes Fresh Cyber Threats

This image is about Halloween exposing fresh cyber threats.

Blog Halloween Cyber Threats Halloween Cyber Threats Report Cyber Street’s Nightmare: Halloween Exposes Fresh Cyber Threats As Halloween nears, we usually consider outfits, spooky dwellings, and lively parties. However, cybercriminals see it as a chance to carry out fresh attacks by taking advantage of the festive mood and lack of focus. This year’s Halloween Cyber […]

ServiceNow Data Leak: Risks of Misconfigured Knowledge Bases

This image is about the ServiceNow data leak.

Blog ServiceNow Data Leak The ServiceNow Knowledge Base (KB) leak exposed sensitive corporate data from over 1,000 instances of the platform, largely due to misconfigured access controls. These KBs, used to store critical corporate data like PII, system credentials, and internal processes, were inadvertently exposed, giving unauthorized users access via public widgets. This widespread misconfiguration highlights ongoing […]

Digital War in the Middle East: Cyber Threats in Israel-Iran Conflict

Digital War in the Middle East: Cyber Threats in Israel-Iran Conflict

Blog Digital War in the Middle East: Cyber Threats in Israel-Iran Conflict During the past few years, the chronic military and political dimensions of the conflict between Israel and Iran have progressively taken on aspects of cyber warfare. This new battle arena involves state-sponsored groups and hacktivists targeting both countries’ critical infrastructure, financial systems, and […]

Unmasking AzzaSec: A Closer Look

This image is about AzzaSec.

Blog In recent years, the cybersecurity landscape has witnessed the emergence of a new and formidable threat group known as AzzaSec. Founded on February 28, 2024, AzzaSec quickly gained notoriety for its hacktivist and financially motivated activities. This group, originating from Italy, has rapidly expanded its influence across Europe and beyond, collaborating with other notorious […]

Securing the Games: Cyber Strategies for Paris Olympics 2024

This image is about Securing the Games- cyber strategies for the Paris Olympics 2024.

Blog Securing the Games: Cyber Strategies for Paris Olympics 2024 The Paris Olympics 2024 will be a landmark event, attracting athletes and visitors from around the globe. However, this grandeur also brings a significant cybersecurity challenge, with cybercriminals and hostile nations poised to target the event. This blog explores the cybersecurity threats facing the Paris Olympics 2024, […]

Hunter’s Lens: Russian Influence Operations Targeting the Paris Olympics 2024

Hunter’s Lens: Russian Influence Operations Targeting the Paris Olympics 2024

Blog The Russian influence operations aimed at the Paris Olympics 2024 The Russian influence operations aimed at the Paris Olympics 2024 differ in a number of meaningful ways from earlier campaigns, revealing a major evolution in tactics, technology, and strategic focus of the disinformation machine. It now looks more like a holistic, multihead hydra in an effort […]

From Code to Threat Intel: How GitHub Monitoring Enhances Security Postures

This image is about enhancing security postures through GitHub monitoring.

Blog From Code to Threat Intel: How GitHub Monitoring Enhances Security Postures In today’s interconnected digital world, platforms like GitHub have become indispensable for developers. They enable seamless collaboration, effective version control, and streamlined continuous integration and deployment (CI/CD) processes. However, this accessibility and openness also make these platforms attractive targets for cybercriminals. These bad actors exploit […]

APT44: The Famous Sandworm of Russia

This image is about APT44, also known as the Sandworm of Russia.

Blog Introduction  APT44 is also known as Sandworm, FROZENBARENTS, Seashell, Quedagh, VOODOO BEAR, and TEMP.Noble, IRON VIKING, G0034, ELECTRUM, TeleBots, IRIDIUM, Blue Echidna, Sandworm Team, Sandworm, CTG-7263, ATK 14, BE2, UAC-0082, and UAC-0113. Research indicates that the group emerged in 2009. This group is attributed by many governments to Unit 74455 of the Main Centre […]

Axiom APT Group

This image is about the Axiom APT group.

Blog Introduction Axiom APT Group, known as Group 72, originates from China and has been conducting sophisticated, persistent threat attacks since 2008. These attacks are characterized by a complex and sustained attempt to infiltrate targeted institutions, organizations, or systems. Target and Sectoral Focus Since 2008, Axiom has conducted advanced attacks on several government agencies and […]

Iran-Based APTs

This image is about Iran-based APTs.

Blog Delve into Iran-based APTs, exploring their cyber strategies, targeted sectors, and the implications for global cybersecurity. APT33  APT33 is a group of APTs also known as Elfin, MAGNALLIUM, Refined Kitten, HOLMIUM, COBALT TRINITY, G0064, ATK35, ATK 35, TA451, Magnallium and APT33. This group was first spotted in 2013 and is known to be based […]

Lotus Panda: China’s Cyber Power

This image is about Lotus Panda, representing China's cyber power.

Blog Introduction Discovered in 2010 and originating from China, Lotus Panda is an APT group also known as Spring Dragon, ST Group, DRAGONFISH, BRONZE ELGIN, and many others. Target and Sectoral Focus Lotus Panda is targeting a wide geography in the Asia-Pacific region and the United States. In particular, countries such as Australia, Brunei, Cambodia, […]

APT39: Cyber Espionage Network in Iran’s Shadow

This image is about APT39, an Iranian cyber espionage group.

Blog Introduction Discovered in 2014 and originating from Iran, APT39 has carved out a unique place for itself on the global cybersecurity scene. Known by various names such as Chafer, REMIX KITTEN, and COBALT HICKMAN, this threat actor is particularly focused on specific targets in the Middle East and Western countries. As ThreatMon, we will […]

What is Threat Intelligence? – All You Need to Know About Cyber Threat Intelligence

This image is about cyber threat intelligence.

Blog Cyber threat intelligence is a crucial aspect of cybersecurity and is becoming increasingly important as threats evolve and become more sophisticated. In this content, prepared by ThreatMon experts, we will explore cyber threat intelligence and its benefits to organizations and provide an overview of threat intelligence platforms. Businesses need to understand that relying solely […]

Cisco Has Been Hacked by Yanluowang Ransomware Group

This image is about Cisco being hacked by the Yanluowang ransomware group.

Blog Cisco’s corporate network was breached by the Yanluowang ransomware group Cisco has confirmed that the Yanluowang ransomware group has breached the company’s network and that the actor has attempted to extort the stolen files under threat of leaking them online. Cisco said on May 24, 2022 that it became aware of a possible compromise. […]

USA Offers $10M Bounty for Providing Information on the Conti Ransomware Gang

This image is about the U.S. offering a $10 million bounty for information on the Conti ransomware gang.

Blog A Reward for Information About The Conti Ransomware Group USA Offers $10M Bounty for Providing Information on the Conti Ransomware Gang. As part of the Justice Awards program, the US State Department announced that a $10 million reward will be offered for information on five high-ranking Conti ransomware members, including the first reveal of […]

PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems

This image is about the 'secretslib' PyPI package dropping a fileless cryptominer on Linux systems.

Blog PyPI Package ‘secretslib’ PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems. A PyPI package named “secretslib” has been identified by Sonatype, which describes itself as “secret mapping and verification made easy”. The package secretly runs cryptominers in the memory of the Linux machine, a technique largely used by fileless malware and cryptominers. Secretslib […]

Microsoft Has Disrupted SEABORGIUM Phishing Operation

This image is about Microsoft's disruption of SEABORGIUM phishing operations.

Blog Seaborgium Phishing Operation The Microsoft Threat Intelligence Center (MSTIC) has taken action and taken measures to disrupt the campaigns launched by the SEABORGIUM actor, which has been tracked since 2017. SEABORGIUM is a threat actor with goals aligned with the interests of the Russian state. SEABORGIUM is a threat actor that often targets the […]

Kaspersky Published a Report on Malicious Browser Extensions

This image is about Kaspersky's report on malicious browser extensions.

Blog Malicious Browser Extensions Kaspersky’s report highlights the rise of malicious browser extensions that steal cryptocurrency and perform web injects. Kaspersky analyzed threat statistics by processing data voluntarily shared by its users for the period from January 2020 to June 2022. According to this data, during the first half of this year, 1,311,557 users tried to […]

13 Organizations Targeted by Chinese-Linked APT41 and a New Wave of Cobalt Strike Infections

This image is about 13 organizations targeted by Chinese-linked APT41 and a new wave of Cobalt Strike infections.

Blog APT41 APT41, one of the state-sponsored ex-hacker groups, breached government networks in six US states in March 2022, including by exploiting a vulnerability in a livestock management system, according to Mandiant researchers. Cybersecurity firm Group-IB’s investigations resulted in nearly 80 proactive notifications of APT41 attacks against their infrastructure to private and government organizations worldwide. […]

WordPress Sites Hacked with Fake Cloudflare DDoS Alerts

This image is about WordPress sites hacked with fake Cloudflare DDoS alerts.

Blog WordPress Sites Hacked with Fake Cloudflare DDoS Alerts: Attackers are tricking users into downloading malware. WordPress Sites Hacked DDoS protection pages typically verify whether the site visitor is actually a human or part of a Distributed Denial of Service (DDoS) attack or other unwanted bot. Bad bots make up a large portion of web […]

CISA Warning Against Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability

This image is about CISA's warning regarding the active exploitation of a Palo Alto Networks PAN-OS vulnerability.

Blog This blog is about CISA’s warning regarding the active exploitation of a Palo Alto Networks PAN-OS vulnerability. PAN-OS vulnerability. CISA added Palo Alto Networks PAN-OS to its Catalog of Known Exploited Vulnerabilities based on evidence of active exploitation This critical vulnerability is tracked with code CVE-2022-0028 (CVSS: 8.6 High). The vulnerability is the misconfiguration […]

Iranian Threat Actor MERCURY Exploits Log4j 2 Vulnerabilities in Unpatched Systems

Iranian Threat Actor MERCURY Exploits Log4j 2 Vulnerabilities in Unpatched Systems

Blog The Iranian threat actor MERCURY has been exploiting unpatched Log4j 2 vulnerabilities in SysAid applications to target organizations, highlighting the critical need for timely security updates. The Iranian threat actor MERCURY The Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team found that Iran-based threat actor MERCURY exploited Log4j 2 vulnerabilities in […]

LastPass Password Manager with 25 Million Users Hacked

This image is about the LastPass password manager hacked.

Blog LastPass Password Manager Hacked, compromising encrypted password vaults and personal information of its 25 million users. LastPass Password Manager Hacked LastPass, one of the world’s largest password managers, has confirmed that it has been hacked. The company revealed that threat actors stole some of the company’s source code and some proprietary LastPass technical information. […]

Chinese Threat Actors APT40 Targets Energy Sector in Australia and the South China Sea

This image is about APT40 targeting the energy sector in Australia and the South China Sea.

Blog APT40, a Chinese state-sponsored hacking group, targets Energy Sector in Australia and the South China Sea. Chinese Threat Actors APT40 The Chinese state-owned threat actor, APT40, targets Australian government agencies, Australian media companies and manufacturers that maintain wind turbine fleets in the South China Sea. Cybersecurity firm Proofpoint, which works in collaboration with PwC, […]

Akira: Undetectable Stealer Unleashed

This image is about Akira, an undetectable stealer.

Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]

TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

This image is about TA558 APT group using malicious Microsoft Compiled HTML Help files.

Blog The TA558 APT advanced persistent threat group has been observed utilizing malicious Microsoft Compiled HTML Help (.chm) files to deliver malware payloads, targeting sectors such as hospitality and travel. Who is TA558 APT? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and […]

Phishing Attack Targeting Turkish Companies

This image is about a phishing attack targeting Turkish companies.

Blog Phishing Attack Targeting Turkish Companies: Turkish companies have been targeted by a phishing campaign involving emails with malicious attachments disguised as RFQ files. Phishing Attack Phishing mail targeting Turkish companies has been detected.  Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging […]

What is “Cyber Threat”?

This image is about the concept of a cyber threat.

Blog The “cyber threat” refers to actions that are deemed malicious and are carried out deliberately or inadvertently by; hackers, criminals, business rivals, spies, dissatisfied workers, organized crime groups, and hactivist societies, in order to obtain unauthorized access, interrupt infrastructure, intercept classified data, and/or share data with third parties. Phishing, 0-day attacks, APT (Advanced Persistent […]

Who is DarkSide Ransomware Group?

This image is about the DarkSide ransomware group.

Blog Who is DarkSide Ransomware Group? FBI claims attack on the Colonial Pipeline has been attributed to DarkSide Ransomware, a kind of new ransomware family that emerged on the crimeware market at the beginning of  November 2020. DarkSide is a Ransomware-as-a-Service with the stated goal of targeting ‘large corporations.’ They are primarily focused on recruiting […]

REvil Ransomware Malware Analysis 

This image is about REvil ransomware malware analysis.

Blog REvil ransomware Dive into the technical analysis of REvil ransomware, detailing its encryption methods, attack vectors, and the strategies. 1. Overall Summary The REvil (also known as Sodinokibi) is a Ransomware-as-a-Service (RaaS). The first attack of REvil in the middle of April 2019, got huge attention from the Cyber Security world due to sharing […]

PetitPotam (MS-EFSRPC) Exploit – CVE2021-36942

This image is about the PetitPotam (MS-EFSRPC) exploit.

Blog PetitPotam (MS-EFSRPC) Exploit – Summary PetitPotam Exploit needs Active Directory Certificate Services, specifically the default settings behind the Web Enrollment service because of this Vulnerability. Adversaries can achieve full Domain Admin (DC) takeover of a target Active Directory by using PetitPotam, which takes attention among Ransomware Gangs, they are able to use this Vulnerability […]

FluBot Android Malware Technical Analysis

This image is about FluBot Android Malware Technical Analysis.

Blog Explore FluBot Android Malware Technical Analysis, known for stealing sensitive data through SMS phishing and remote access capabilities. FluBot Android Malware The FluBot it’s an Android malware that targets Android devices and spreads to victims via phishing SMS messages that contain a malicious link to download the FluBot app. Victims click on this link […]

The Dark Face of the Web: Dark Web & Deep Web

This image is about The Dark Face of the Web: Dark Web & Deep Web

Blog Discover the distinctions between dark web – deep web, examining their roles, accessibility and implications for cybersecurity and illicit activities. The distinctions between dark web – deep web Web is the common name of the “World Wide Web“, which is a subset of the internet that consists of pages that can be accessed via […]

What is BOTNET?

This image is about botnet.

Blog A botnet is a network of compromised computers controlled by a malicious actor, often used to launch large-scale cyber attacks. Cyber attackers establish a network by infecting computers with malware. This remotely controlled malware is called a “bot“. The network of these bots is called a “botnet“. These computers are also called zombies. Sometimes […]

LockBit 2.0 Ransomware Analysis

This image is about LockBit 2.0 ransomware analysis.

Blog 1 Executive Summary 1.1 Overview LockBit 2.0 is a Ransomware as a Service (RaaS), with an Affiliate program in place. Oftentimes, their binaries are cryptographically signed with valid, stolen certificates. LockBit Ransomware have some similarity with Maze Ransomware in UAC bypass techniques but Encryption Routine makes LockBit 2.0 so powerful and fast against other […]

NOBELIUM APT29 – EnvyScout

This image is about NOBELIUM APT29's use of EnvyScout.

Blog Summary of Analysis The NOBELIUM group is also known as APT29. NOBELIUM has generally targeted government institutions, non-governmental organizations, think tanks, the military, IT service providers, R&D companies working in the healthcare field, and telecommunication providers in its attacks so far. It has been observed that the NOBELIUM group has been using Spear Phishing […]