Threat Overview In today's digital landscape, cyber threats are evolving at an unprecedented pace. One of the latest developments comes from the notorious actor group known as Mustang Panda. This group has been actively deploying new
Continue ReadingAuthor: essadmin
CVE-2025-24054, NTLM Exploit in the Wild
Threat Overview The Security Operations Center (SOC) has identified a critical threat report published by CheckPoint on April 16, 2025. The report details CVE-2025-24054, an NTLM exploit that is actively being used in the wild. This
Continue ReadingWatch out for these traps lurking in search results
Threat Overview The Security Operations Center (SOC) has identified a new threat report published by CyberHunter_NL on April 15, 2025. This report highlights significant cyber threats that are currently lurking in search engine results. The confidence
Continue ReadingSlow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware
Threat Overview The Security Operations Center (SOC) has identified a new threat report published by AlienVault on April 14, 2025. This report details the activities of Slow Pisces, a North Korean state-sponsored threat group, which has
Continue ReadingSmishing Triad: Chinese eCrime Group Targets 121+ Countries, Introduces New Banking Phishing Kit
Threat Overview The Security Operations Center (SOC) has identified a significant and alarming threat report published by AlienVault on April 10, 2025. The report details the activities of the Chinese eCrime group known as Smishing Triad,
Continue ReadingExploitation of CLFS zero-day leads to ransomware activity
Threat Report Overview The Security Operations Center (SOC) has received a critical threat report published by AlienVault on April 9, 2025. The report details the exploitation of a zero-day vulnerability in the Windows Common Log File
Continue ReadingCrazyHunter: The Rising Threat of Open-Source Ransomware
Threat Overview The cybersecurity landscape is continually evolving, with new threats emerging at an alarming rate. One of the latest and most concerning developments is the rise of open-source ransomware, as highlighted in a recent threat
Continue ReadingHow ToddyCat tried to hide behind AV software
Threat Overview The cybersecurity landscape is constantly evolving, with threat actors developing increasingly sophisticated methods to evade detection and infiltrate systems. One such example is the recent activities of the ToddyCat Advanced Persistent Threat (APT) group,
Continue ReadingSuspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)
Threat Report for Security Operation Center Published by threatmanager on April 4, 2025 Confidence Level: High Reliability of the report: B - Usually reliable Revoke Status: False Threat Overview A new threat report has been published
Continue ReadingOutlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective
Threat Overview The Security Operations Center (SOC) has recently identified a significant threat report published by AlienVault on April 3, 2025. This report details the Outlaw Linux malware, which poses a persistent and growing threat to
Continue Reading