Category: Cyber Threat Intelligence
-
DISGOMOJI: Not A Dance Move
A sophisticated malware targeting Linux servers with emojis as the form of execution, DISGOMOJI has emerged attributed to none other than the threat actor UTA0137. Utilized as part of a cyber-espionage campaign by the Pakistan-based actor, follow along as we dive into what exactly emojis have to do with Linux servers and how these state… Read more
-
Safeguarding Your Digital Gateways and APIs
Application Programming Interfaces or APIs are the mechanisms by which different software and applications can communicate with one another. APIs are a core component of the web-based applications that power our world today. They can be found in everything from weather apps to healthcare technologies to every smart device on the market. For as many… Read more
-
Preview Pane Attacks
In today’s digital landscape, cybersecurity threats are evolving rapidly, and one of the more insidious methods attackers use to infiltrate systems is through preview pane attacks. These attacks leverage vulnerabilities in software that display previews of content, such as emails or documents, without fully opening them. In this blog post, we’ll delve into preview pane… Read more
-
Cybersecurity and Cryptocurrency: Safeguarding Digital Assets in 2024
The emergence of cryptocurrency — decentralized, digital alternatives to fiat money ― is changing the ways in which we perform financial transactions. Yet through the proliferation of cryptocurrencies, come greater than ever security concerns. With the invention of cryptocurrencies, cyber-related incidents such as hacking, and fraud have also become commonplace. To anticipate these security issues,… Read more
-
Shadow AI vs. Shadow IT
Within the corridors of modern enterprises, a lesser-known dichotomy lurks in the shadows: the juxtaposition of Shadow Artificial Intelligence (AI) and Shadow Information Technology (IT). These clandestine counterparts represent both the promise and peril of technological autonomy, each possessing the potential to revolutionize workflows or disrupt established protocols. Follow along as we illuminate the path… Read more
-
Unraveling Living off the Land Cyber Attacks
The idea of a cyber attack conjures up many ideas in peoples’ minds. It is easy to imagine the attacks that make headlines: companies paying millions of dollars to ransomware gangs, massive DDoS attacks rendering websites inaccessible, or data breaches that compromise droves of sensitive records. These attacks are loud. The attacker wants you to… Read more
-
The Dark Web: Exploring Hidden Dangers and Cybercrime Networks
In the vast expanse of the internet lies a hidden realm known as the dark web. As opposed to the surface web, which the average person uses daily, it operates on a deeper level of concealment — nurturing a convolution of illegal doings alongside networks focused on cybercrime. Often depicted as being mysterious and dangerous,… Read more
-
Royal Tiger – The First Officially Designated Robocall Threat Actor
On Monday, May 13th, the Federal Communications Commission (FCC) officially named its first robocall threat actor group,’ Royal Tiger’. This move goes along with the FCC’s new robocall bad actor classification system, Consumer Communications Information Services Threat (C-CIST). This system aims to assist law enforcement and industry partners with tracking threat actors behind robocall campaigns. Royal Tiger is comprised of members operating… Read more
-
Guarding Against Android Cyber Threats
When thinking about security measures to fight against malicious activity, rarely do people consider cellular security on the same level as network security. Social engineering techniques used by threat actors including phishing, vishing, and smishing should not be the end of where protection for mobile devices stops at. Identity theft and other types of exploits… Read more
-
The Community That Spawned Notorious Threat Actors
Some might wonder where threat actors get their origin, where do they learn their expertise? The ‘Community’ also referred to as ‘The Com’ or ‘The Comm’ is an online presence filled with individuals from diverse backgrounds including gamers, hackers, and recreational users. More than hundreds of individuals take part in various activities from innocent meme-sharing… Read more