Securing the Games: Cyber Strategies for Paris Olympics 2024

This image is about cyber strategies for the Paris Olympics 2024.

Blog The Paris Olympics 2024 will be a landmark event, attracting athletes and visitors from around the globe. However, this grandeur also brings a significant cybersecurity challenge, with cybercriminals and hostile nations poised to target the event. This blog explores the cybersecurity threats facing the Paris Olympics 2024, assesses current preparedness, and recommends strategies to mitigate these […]

Hunter’s Lens: Russian Influence Operations Targeting the Paris Olympics 2024

This image is about Russian influence operations targeting the Paris Olympics 2024.

Blog The Russian influence operations aimed at the Paris Olympics 2024 differ in a number of meaningful ways from earlier campaigns, revealing a major evolution in tactics, technology, and strategic focus of the disinformation machine. It now looks more like a holistic, multihead hydra in an effort to maximize the impact and reach of disinformation efforts. 1. […]

From Code to Threat Intel: How GitHub Monitoring Enhances Security Postures

This image is about enhancing security postures through GitHub monitoring.

Blog In today’s interconnected digital world, platforms like GitHub have become indispensable for developers. They enable seamless collaboration, effective version control, and streamlined continuous integration and deployment (CI/CD) processes. However, this accessibility and openness also make these platforms attractive targets for cybercriminals. These bad actors exploit GitHub to introduce vulnerabilities, steal sensitive information, or inject malicious code […]

APT44: The Famous Sandworm of Russia

This image is about APT44, also known as the Sandworm of Russia.

Blog Introduction  APT44 is also known as Sandworm, FROZENBARENTS, Seashell, Quedagh, VOODOO BEAR, and TEMP.Noble, IRON VIKING, G0034, ELECTRUM, TeleBots, IRIDIUM, Blue Echidna, Sandworm Team, Sandworm, CTG-7263, ATK 14, BE2, UAC-0082, and UAC-0113. Research indicates that the group emerged in 2009. This group is attributed by many governments to Unit 74455 of the Main Centre […]

Axiom APT Group

This image is about the Axiom APT group.

Blog Introduction Axiom APT Group, known as Group 72, originates from China and has been conducting sophisticated, persistent threat attacks since 2008. These attacks are characterized by a complex and sustained attempt to infiltrate targeted institutions, organizations, or systems. Target and Sectoral Focus Since 2008, Axiom has conducted advanced attacks on several government agencies and […]

Iran-Based APTs

This image is about Iran-based APTs.

Blog APT33  APT33 is a group of APTs also known as Elfin, MAGNALLIUM, Refined Kitten, HOLMIUM, COBALT TRINITY, G0064, ATK35, ATK 35, TA451, Magnallium and APT33. This group was first spotted in 2013 and is known to be based in Iran. The countries targeted by APT33 include Iran, Iraq, Israel, Saudi Arabia, South Korea, the […]

Lotus Panda: China’s Cyber Power

This image is about Lotus Panda, representing China's cyber power.

Blog Introduction Discovered in 2010 and originating from China, Lotus Panda is an APT group also known as Spring Dragon, ST Group, DRAGONFISH, BRONZE ELGIN, and many others. Target and Sectoral Focus Lotus Panda is targeting a wide geography in the Asia-Pacific region and the United States. In particular, countries such as Australia, Brunei, Cambodia, […]

APT39: Cyber Espionage Network in Iran’s Shadow

This image is about APT39, an Iranian cyber espionage group.

Blog Introduction Discovered in 2014 and originating from Iran, APT39 has carved out a unique place for itself on the global cybersecurity scene. Known by various names such as Chafer, REMIX KITTEN, and COBALT HICKMAN, this threat actor is particularly focused on specific targets in the Middle East and Western countries. As ThreatMon, we will […]

What is Threat Intelligence? – All You Need to Know About Cyber Threat Intelligence

This image is about cyber threat intelligence.

Blog Cyber threat intelligence is a crucial aspect of cybersecurity and is becoming increasingly important as threats evolve and become more sophisticated. In this content, prepared by ThreatMon experts, we will explore cyber threat intelligence and its benefits to organizations and provide an overview of threat intelligence platforms. Businesses need to understand that relying solely […]

Cisco Has Been Hacked by Yanluowang Ransomware Group

This image is about Cisco being hacked by the Yanluowang ransomware group.

Blog Cisco has confirmed that the Yanluowang ransomware group has breached the company’s network and that the actor has attempted to extort the stolen files under threat of leaking them online. Cisco said on May 24, 2022 that it became aware of a possible compromise. CyberKnow Twitter It was determined that a Cisco employee had […]