Threat Overview The cybersecurity landscape is constantly evolving, with new threats emerging regularly. One of the latest developments comes from the North Korean-linked threat actor APT-C-28, also known as ScarCruft or APT37. This group has launched
Continue ReadingMonth: February 2025
Exploited Vulnerabilities in SimpleHelp, PANOS, and SonicWall Added to CISA’s Catalog – Immediate Mitigation Recommended
In today's rapidly evolving cybersecurity landscape, staying ahead of potential threats is paramount. The latest threat report published by Eric Ford on February 19, 2025, highlights critical vulnerabilities in SimpleHelp, PANOS, and SonicWall products that have
Continue ReadingAmazon Phish Hunts for Security Answers and Payment Information
In the ever-evolving landscape of cyber threats, a new phishing scheme targeting Amazon Prime users has been identified. This sophisticated campaign aims to steal login credentials, verification information, and payment data, making it a significant concern
Continue ReadingAn Update on Fake Updates: Two New Actors, and New Mac Malware | Proofpoint US
In the ever-evolving landscape of cybersecurity, staying ahead of emerging threats is crucial. The latest threat report from Proofpoint, titled 'An Update on Fake Updates: Two New Actors, and New Mac Malware,' sheds light on new
Continue ReadingBeware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
In recent weeks, a sophisticated cyber threat has surfaced, targeting unsuspecting users through fake Outlook troubleshooting calls. These deceptive calls are meticulously crafted to appear legitimate, ultimately leading to the deployment of ransomware on the victim's
Continue ReadingUnraveling the Many Stages and Techniques Used by RedCurl/EarthKapre APT
In January 2025, the eSentire Threat Response Unit (TRU) identified a sophisticated cyber espionage campaign orchestrated by the EarthKapre/RedCurl Advanced Persistent Threat (APT) group. This report delves into the intricate stages and techniques employed by this
Continue ReadingDon’t Ghost the SocGholish: GhostWeaver Backdoor
In the ever-evolving landscape of cyber threats, staying informed about the latest malware and attack vectors is crucial for maintaining robust security measures. A recent threat report published by AlienVault on February 17, 2025, sheds light
Continue ReadingMultiple Russian Threat Actors Targeting Microsoft Device Code Authentication | Volexity
In today's rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated and pervasive. The recent threat report published by CyberHunter_NL on February 14, 2025, sheds light on a concerning trend: multiple Russian threat actors targeting
Continue ReadingRussian Influence Operations Target German Elections
Threat Overview The upcoming German federal elections on February 23, 2025 are under significant threat from Russian influence operations. According to a recent report published by AlienVault on February 13, 2025, these operations aim to disrupt
Continue ReadingTracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
In the ever-evolving landscape of cybersecurity, threat actors continually adapt their tactics to exploit vulnerabilities and evade detection. A recent report published by AlienVault on February 13, 2025, sheds light on a new threat involving the
Continue Reading