January 2024
ICS and OT threat predictions for 2024
We do not expect rapid changes in the industrial cyberthreat landscape in 2024. Most of the below-described trends have been observed befor...
When RAR Roared!
WinRAR is a widely used compression utility around the world today. It is famously used to create the RAR archive. Though RAR is a proprieta...
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets
Based on our estimates, from approximately April 2022 until November 2023, Pawn Storm attempted to launch NTLMv2 hash relay attacks through ...
DarkGate malware delivered via Microsoft Teams - detection and response
Executive summary While most end users are well-acquainted with the dangers of traditional phishing attacks, such as those delivered via em...
Sophos MDR and Sophos XDR now integrate with Google Workspace
Protect your Google Workspace productivity tools with Sophos Article Link: Sophos MDR and Sophos XDR now integrate with Google Workspace – ...
AI Recipient Validation Release on January 30, 2024
Improvements Optimizations to the detection of sensitive information have been made. Improvements to relationship calculations have been ...
Navigating India’s Data Protection Landscape: A SEQRITE Perspective
Estimated reading time: 3 minutes India’s swift enactment of the Digital Personal Data Protection (DPDP) Act has triggered considerable ap...
ISC Stormcast For Monday, January 29th, 2024 https://ift.tt/YT6cyZd, (Mon, Jan 29th)
Article Link: https://isc.sans.edu/diary/rss/30596 1 post - 1 participant Read full topic Malware Analysis, News and Indicators - Lates...
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol (RDP) host, leading to ...
How-To Install Arkime 4.0 in Linux - A Quick Guide on Installation and Processing PCAPs
Article Link: https://www.youtube.com/watch?v=2Sy-v_YPP7I 1 post - 1 participant Read full topic Malware Analysis, News and Indicators ...
Malware Analysis - Unpacking AutoIt stub with large obfuscated script
Article Link: https://www.youtube.com/watch?v=xzxg0Jxnv0E 1 post - 1 participant Read full topic Malware Analysis, News and Indicators ...
Cybersecurity for Industrial Control Systems: Best practices
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or inf...
A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Onslaught
As we reflect on the cybersecurity journey of 2023, we uncover valuable lessons that shape our understanding of the ever-changing landscape ...
15 arrested in intercontinental crackdown against Nigerian crime syndicates
Results of the operation include:15 persons arrested18 victims or possible human trafficking victims detected4 new investigations initiated3...
A Batch File With Multiple Payloads, (Fri, Jan 26th)
Windows batch files (.bat) are often seen by people as very simple but they can be pretty complex or… contain interesting encoded payloads! ...
Memory Scanning for the Masses
Author: Axel Boesenach and Erik Schamper In this blog post we will go into a user-friendly memory scanning Python library that was created ...
Popular Posts
Archive
- Jun 2025 [62]
- May 2025 [87]
- Apr 2025 [76]
- Mar 2025 [83]
- Feb 2025 [71]
- Jan 2025 [81]
- Dec 2024 [82]
- Nov 2024 [77]
- Oct 2024 [75]
- Sept 2024 [85]
- Aug 2024 [85]
- Jul 2024 [73]
- Jun 2024 [76]
- May 2024 [81]
- Apr 2024 [77]
- Mar 2024 [61]
- Feb 2024 [72]
- Jan 2024 [84]
- Dec 2023 [73]
- Nov 2023 [74]
- Oct 2023 [115]
- Sept 2023 [136]
- Aug 2023 [134]
- Jul 2023 [48]
- Jun 2023 [15]