Search Post related with “Threat Research”
*Total Collection : 4496 Threat Research (auto update every day)
Last 100 Threat Research
- From SIEM to Ticketing: Streamlining Security Operations with Cado’s Export Capabilities
- How a Vulnerability in Cinema Booking Systems Can Block Seats and Impact Revenue
- Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine | Microsoft Security Blog
- Fileless Malware Nedir? S1Ep2 Cobalt Kitty Operasyonu
- Advanced Threat Detection: Exploitation Tactics from a CIRT Technical Interview
- Malicious driver from Equation APT
- Pivoting for Nosviak
- ValleyRAT: A Rootkit Leveraging Stolen Certificates and Bypassing AVs
- Qbot is Back.Connect
- Beyond Flesh and Code: Building an LLM-Based Attack Lifecycle With a Self-Guided Malware Agent
- Dark Web Profile: OilRig (APT34)
- PlushDaemon compromises supply chain of Korean VPN service
- Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
- Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4
- Hidden Threats of Game Assistants | Analysis Report on the “Catlavan” Backdoor Spread in Gaming Forums
- Targeted supply chain attack against Chrome browser extensions
- Tracking Down APT Group WIRTE’s DNS Movements
- Imperva Protects Against the Exploited CVEs in the Cleo Data Theft Attacks
- Supercharge Your CTI: AI-Powered IOC Collection with ChatGPT, Inoreader and Google Drive
- The New Face of Ransomware: Key Players and Emerging Tactics of 2024
- Annual Payment Fraud Intelligence Report: 2024
- Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing”
- Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations
- Introducing ThreatXpose: Who, What and How of Cyber Intelligence
- TA505 Threat Hunting: Advanced Queries for Detecting Malware and Cyber Attacks
- InvisibleFerret Malware: Technical Analysis
- Windows BitLocker — Screwed without a Screwdriver — Neodyme
- Beware of Contacts through LinkedIn: They Target Your Organization’s Property, Not Yours – JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- How Malware Detect Virtual Machines ?
- Malware disguised as a Public document (personal, form) created by Kimsuky
- Analysis Report on the Latest Phishing Incident by Clickfix: The Tragedy of CAPTCHA Resistance – Security Cow
- Still Attacks by Vidar: Regular Cadence and Old Strategies Always Effective
- Fortinet Zero-Day CVE-2024-55591 Exposed: Super-Admin Access Risk
- Facilitating Phishing and Pig Butchering Activities using Zendesk Infrastructure [Bait & Switch Mode]
- Qbot is Back Connect
- RST TI Report Digest: January 20, 2025
- Tracking Adversaries: Ghostwriter APT Infrastructure
- NICKEL TAPESTRY Infrastructure Associated with Crowdfunding Scheme
- RansomHub Affiliate leverages Python-based backdoor
- Sliver Implant Targets German Entities with DLL Sideloading and Proxying Techniques
- If you think you blocked NTLMv1 in your org, think again
- Nmap for Beginners
- Mastering Azure Managed Identities – Attack & Defense, Part 1
- Detecting and mitigating CVE-2024-12084: rsync remote code execution
- Weekly IT Vulnerability Report: Critical Updates for SAP, Microsoft, Fortinet, and Others
- Financial phishing exploits fake communications from the Department of Health
- IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
- BlackSuit Ransomware Group: What Have Changed After Royal Ransomware
- SharpRhino: An old, new threat
- Mercedes-Benz Head Unit security research report
- New Star Blizzard spear-phishing campaign targets WhatsApp accounts | Microsoft Security Blog
- Threat Bulletin: Weaponized Software Targets Chinese-Speaking Organizations
- ANDROID MALWARE IN DONOT APT OPERATIONS
- Threat Brief: CVE-2025-0282 and CVE-2025-0283
- Malicious PyPI Package ‘pycord-self’ Targets Discord Developers with Token Theft and Backdoor Exploit
- From Data Capture to Analysis: How Cado Simplifies Cloud Investigations
- WhoisXML API Launches First Watch Malicious Domains Data Feed with 97% Predictive Precision
- Warning Against ModiLoader (DBatLoader) Spreading via MS Windows CAB Header Batch File (*.cmd)
- MintsLoader: StealC and BOINC Delivery
- Gootloader inside out
- Fortinet firewalls hit with new zero-day attack, older data leak
- Evading Endpoint Detection and Response EDR
- 15K Fortigate Firewall Configs Leaked By Belsen Group: Dumped Using Zero-Day in 2022
- Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
- DigitalPulse Proxyware Being Distributed Through Ad Pages
- Securonix Threat Labs 2024 Annual Autonomous Threat Sweeper Intelligence Insights
- Unpacking the LastPass Hack: A Case Study | CSA
- JustJoin Landing Page Linked to Suspected DPRK Activity Resurfaces
- Tracking cloud-fluent threat actors – Part two: Behavioral cloud IOCs
- The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads
- Kimsuky Cobalt Strike Malware Test Zip 2025.1.11
- Ransomware and Cyber Extortion in Q4 2024
- “Securing Your Single-Page Applications: Essential Fixes”
- Practical Methods for Decapping Chips
- Microsoft Patch Tuesday January 2025 Security Update Review Qualys ThreatPROTECT
- Understanding the Technology that Powers the Cado Platform
- Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
- Zombies Never Die: Analysis of the Current Situation of the Large Zombie Network AIRASHI
- Kimsuky Hacking Group’s Malware Attack on the Korean Defense Industry Association – Defense Industry Digital Innovation Seminar (Planned) (2025.1.12)
- Volt Typhoon: Analyzing Espionage Campaigns Against Critical Infrastructure
- VMware ESXi Logging and Detection Opportunities
- CVE-2020-10558 Denial of Service Attack for All Tesla Vehicles
- Origins of A Logger – Agent Tesla
- Campaign TrailRansomHub Ransomware: Darktrace’s Investigation of the Newest Tool in ShadowSyndicate’s ArsenalbyQing Hong Kwa
- New Year, Old Threats: What Does the DNS Reveal About 2025?
- The Evolution of Ransomware: From Simple Encryption to Double Extortio…
- Infostealer Logs to Fuel a New Wave of AWS Ransomware Attacks
- One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks
- Javascript Sample – Swift Transaction Report.js
- The Evolution of Cybercrime Cartels: From Lone Wolves to Sophisticated Syndicates | Krypt3ia
- Kill Switch Hidden in npm Packages Typosquatting Chalk and Chokidar
- Analysis of a Lumma Stealer Campaign with Fake CAPTCHA Conducted Through Compromised Italian Domain
- Deep Dive Into a Linux Rootkit Malware
- Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations
- Hunt for RedCurl | Huntress
- Green Alliance Technology Threat Intelligence Weekly Report (2025.01.06-2025.01.12) – Green Alliance Technology Blog
- Hack The Box Escape
- Statistical Report on Phishing Emails in Q4 2024
- VulnNet: Internal – From Recon to Root
- Wiz Research Identifies Exploitation in the Wild of Aviatrix Controller RCE CVE-2024-50603
>> Access All Threat Research
Reference for Threat Research
This Threat Research category section will FILTER and FETCH the POST (related with Analysis Report only) from the following sites:
- asec.ahnlab.com
- any.run/cybersecurity-blog/
- attackiq.com
- bitdefender.com/blog/labs/
- cadosecurity.com/blog/
- cisa.gov/news-events/cybersecurity-advisories/
- crowdstrike.com/blog/
- cybereason.com/blog/category/research/
- darktrace.com/blog/
- fortinet.com/blog/threat-research/
- harfanglab.io/en/insidethelab/
- malwarebytes.com/blog/threat-intelligence/
- mandiant.com/resources/blog/
- mcafee.com/blogs/other-blogs/mcafee-labs/
- proofpoint.com/us/blog
- securelist.com/tag/malware-descriptions/
- securityintelligence.com/category/x-force/threat-intelligence/
- blog.talosintelligence.com
- trendmicro.com/en_us/research/
- unit42.paloaltonetworks.com
- nextron-systems.com/blog/
- team-cymru.com/blog/categories/threat-research/
- zscaler.com/blogs/
- blog.sonicwall.com
- labs.k7computing.com/
- recordedfuture.com/blog
- blog.sekoia.io/category/research-threat-intelligence/
- embee-research.ghost.io
- netspi.com/blog/technical/
- huntress.com/blog
- other 100++ sources
For the sites below, automatic FETCH cannot be performed
(i need to monitor it manual, will be delay 3-7 days)
Bellow are other reference, but for some reason i’m not fetching it automatically
(i need to review the article manually, will be delay 3-5 days)
- cleafy.com/labs (update 1-2 months)
- guidepointsecurity.com/blog/ > category: threat advisory
- research.openanalysis.net
- blog.phylum.io/tag/research/
- shadowstackre.com/analysis/
- mssplab.github.io
- farghlymal.github.io
- asec.ahnlab.com/ko/
- blog.bushidotoken.net
- kroll.com/en/insights/publications/cyber
- Sentinelone.com
- blog.lumen.com
Update
- December, 2024: securonixblog – Fixed (xpath error)
- December, 2024: huntress – Fixed (xpath error)
- December, 2024: nccgroup – Failed (Incapsula)
- December, 2024: Mandiant – Removed (now part of Google Cloud)
- December, 2024: antiy.cn – Failed (curl or xpath error)
- December, 2024: sonicwall.com – Failed (curl error)
- January, 2025: team-cymru.com (RSS Feed Removed)
Update January, 2025
“Due to copyright reasons, starting January 2025, this site will no longer display the full content of sourced articles. Only Summaries, Key Points, MITRE Tactics for Threat Research, and selected IoCs will be provided. To read the full article, please click on the ‘source’ link to view it on the original website.”