Ransomware Attacks are Evolving: What You Need to Know

One look at all the ransomware attacks from the past few years, and it’s clear that crypto-malware actors are attempting to maximize their financial gain. We’ve observed these threat groups using multiple techniques to profit even more off their v… Continue reading Ransomware Attacks are Evolving: What You Need to Know

Combating Sleeper Threats With MTTD

During the SolarWinds Orion supply chain compromise, threat actors lurked in the victim’s network for more than a year. Discovered by FireEye in December 2020, the earliest traces of a modified SolarWinds Orion go back as early as October 2019. Although these early versions did not contain the malicious backdoor (this was added in March […]

The post Combating Sleeper Threats With MTTD appeared first on Security Intelligence.

Continue reading Combating Sleeper Threats With MTTD

Feds Pinpoint Russia as ‘Likely’ Culprit Behind SolarWinds Attack

The widespread compromise affecting key government agencies is ongoing, according to the U.S. government. Continue reading Feds Pinpoint Russia as ‘Likely’ Culprit Behind SolarWinds Attack

Sextortionist Campaign Targets iOS, Android Users with New Spyware

Goontact lures users of illicit sites through Telegram and other secure messaging apps and steals their information for future fraudulent use. Continue reading Sextortionist Campaign Targets iOS, Android Users with New Spyware

RDPalooza: RDPs in the World of Cybercrime

  Key Points  Remote Desktop Protocol (RDP) is a built-in part of the Windows toolkit popular for facilitating remote work. Cybercriminals take interest in compromising RDP endpoints as they provide direct access into a victim environment via a graphic… Continue reading RDPalooza: RDPs in the World of Cybercrime

iPhone Bug Allowed for Complete Device Takeover Over the Air

Researcher Ian Beer from Google Project Zero took six months to figure out the radio-proximity exploit of a memory corruption bug that was patched in May. Continue reading iPhone Bug Allowed for Complete Device Takeover Over the Air

APT Exploits Microsoft Zerologon Bug: Targets Japanese Companies

Threat actors mount year-long campaign of espionage, exfiltrating data, stealing credentials and installing backdoors on victims’ networks. Continue reading APT Exploits Microsoft Zerologon Bug: Targets Japanese Companies