From Code to Threat Intel: How GitHub Monitoring Enhances Security Postures

Blog From Code to Threat Intel: How GitHub Monitoring Enhances Security Postures In today’s interconnected digital world, platforms like GitHub have become indispensable for developers. They enable seamless collaboration, effective version control, and streamlined continuous integration and deployment (CI/CD) processes. However, this accessibility and openness also make these platforms attractive targets for cybercriminals. These bad actors exploit […]
APT44: The Famous Sandworm of Russia

Blog Introduction APT44 is also known as Sandworm, FROZENBARENTS, Seashell, Quedagh, VOODOO BEAR, and TEMP.Noble, IRON VIKING, G0034, ELECTRUM, TeleBots, IRIDIUM, Blue Echidna, Sandworm Team, Sandworm, CTG-7263, ATK 14, BE2, UAC-0082, and UAC-0113. Research indicates that the group emerged in 2009. This group is attributed by many governments to Unit 74455 of the Main Centre […]
Axiom APT Group

Blog Introduction Axiom APT Group, known as Group 72, originates from China and has been conducting sophisticated, persistent threat attacks since 2008. These attacks are characterized by a complex and sustained attempt to infiltrate targeted institutions, organizations, or systems. Target and Sectoral Focus Since 2008, Axiom has conducted advanced attacks on several government agencies and […]
Iran-Based APTs

Blog Delve into Iran-based APTs, exploring their cyber strategies, targeted sectors, and the implications for global cybersecurity. APT33 APT33 is a group of APTs also known as Elfin, MAGNALLIUM, Refined Kitten, HOLMIUM, COBALT TRINITY, G0064, ATK35, ATK 35, TA451, Magnallium and APT33. This group was first spotted in 2013 and is known to be based […]
Lotus Panda: China’s Cyber Power

Blog Introduction Discovered in 2010 and originating from China, Lotus Panda is an APT group also known as Spring Dragon, ST Group, DRAGONFISH, BRONZE ELGIN, and many others. Target and Sectoral Focus Lotus Panda is targeting a wide geography in the Asia-Pacific region and the United States. In particular, countries such as Australia, Brunei, Cambodia, […]
APT39: Cyber Espionage Network in Iran’s Shadow

Blog Introduction Discovered in 2014 and originating from Iran, APT39 has carved out a unique place for itself on the global cybersecurity scene. Known by various names such as Chafer, REMIX KITTEN, and COBALT HICKMAN, this threat actor is particularly focused on specific targets in the Middle East and Western countries. As ThreatMon, we will […]
What is Threat Intelligence? – All You Need to Know About Cyber Threat Intelligence

Blog Cyber threat intelligence is a crucial aspect of cybersecurity and is becoming increasingly important as threats evolve and become more sophisticated. In this content, prepared by ThreatMon experts, we will explore cyber threat intelligence and its benefits to organizations and provide an overview of threat intelligence platforms. Businesses need to understand that relying solely […]
Cisco Has Been Hacked by Yanluowang Ransomware Group

Blog Cisco’s corporate network was breached by the Yanluowang ransomware group Cisco has confirmed that the Yanluowang ransomware group has breached the company’s network and that the actor has attempted to extort the stolen files under threat of leaking them online. Cisco said on May 24, 2022 that it became aware of a possible compromise. […]
USA Offers $10M Bounty for Providing Information on the Conti Ransomware Gang

Blog A Reward for Information About The Conti Ransomware Group USA Offers $10M Bounty for Providing Information on the Conti Ransomware Gang. As part of the Justice Awards program, the US State Department announced that a $10 million reward will be offered for information on five high-ranking Conti ransomware members, including the first reveal of […]
PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems

Blog PyPI Package ‘secretslib’ PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems. A PyPI package named “secretslib” has been identified by Sonatype, which describes itself as “secret mapping and verification made easy”. The package secretly runs cryptominers in the memory of the Linux machine, a technique largely used by fileless malware and cryptominers. Secretslib […]