Generative Data Intelligence

Tag: APT

Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East

Sixteen advanced persistent threat (APT) groups targeted organizations in the Middle East over the past two years with cyberattacks focused on government agencies, manufacturing...

Top News

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

The Double-Edged Sword of Faster Payments

The financial world is hurtling towards instant gratification. Hofstadter's Law seems particularly apt when discussing the breakneck pace of implementing faster payment systems. Recently, India's Securities...

Rescoms rides waves of AceCryptor spam

Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...

Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base

The Russian state-sponsored advanced persistent threat (APT) group known as Midnight Blizzard has nabbed Microsoft source code after accessing internal repositories and systems, as...

Aptos Removes Bridge Limits In Cross-Chain Push – The Defiant

Aptos’s TVL is up 822% in five months.Aptos is seeking to bolster its cross-chain interoperability with other networks, with the team removing the daily...

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

Video Evasive Panda has been spotted targeting Tibetans in several countries and territories...

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

10 Essential Processes for Reducing the Top 11 Cloud Risks

It's an old trope by now that anyone not moving to the cloud is falling behind. As a result, cloud security has been on...

Critical TeamCity Bugs Endanger Software Supply Chain

Cloud versions of the JetBrains TeamCity software development platform manager have already been updated against a new pair of critical vulnerabilities, but on-premises deployments...

Chinese APT Developing Exploits to Defeat Patched Ivanti Users

A Chinese espionage group is on the verge of developing malware that can persist in Ivanti edge devices even after patches, upgrades, and factory...

Vulnerabilities in business VPNs under the spotlight

Virtual Private Network (VPN) services have emerged as essential tools for modern businesses in recent years, doubly so since helping save the day for...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?