Search results: TTPs

Detecting Volt Typhoon TTPs – Security Spotlight

Detecting Volt Typhoon TTPs – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. Last week, the ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Actor TTPs & Cyber Threat Intelligence." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Actor TTPs & Cyber Threat Intelligence

| | Blog, CTI Strategies
Intelligence-driven cybersecurity is proactive. And proactive cybersecurity drives better defenses by improving the ability to anticipate threats, increase situational awareness, and reduce attack surfaces.  Today’s cyber threat landscape sees more complex and ...

Snip3 Crypter Reveals New TTPs Over Time

|
Zscaler ThreatLabz researchers observed multiple threat campaigns utilizing the Snip3 crypter, a multi-stage remote access trojan (RAT) loader with new TTPs and available since 2021 as a crypter-as-a-service offering. The Snip3 Crypter ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Tactical Threat Intelligence: Cybercriminals, TTPs, and More." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Tactical Threat Intelligence: Cybercriminals, TTPs, and More

| | Blog, CTI Strategies
Cyber threat intelligence plays a critical role in a proactive cybersecurity strategy. By gathering and analyzing data, security teams and company leaders are able to make quick and effective decisions about cyber ...
AI, defense, cybersecurity,

Splunk: Cybercriminals Use These Types of TTPs

A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...
Security Boulevard
The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

| | News & Views
This year has seen an enormous increase in the number and claimed impact of hacktivist attacks on critical infrastructure and enterprises operating in critical services. Many attacks target unmanaged devices such as ...

APT-36 Uses New TTPs and New Tools to Target Indian Governmental Organizations

|
Summary APT-36 (also known as Transparent Tribe) is an advanced persistent threat group attributed to Pakistan that primarily targets users working at Indian government organizations. Zscaler ThreatLabz has been closely monitoring the ...

OpenSSL, Used by Majority of HTTPS Websites, Pre-Announces Critical Vulnerability Patch

| | Blog
OpenSSL, the open-source cryptography library widely used across the internet by servers and websites, has pre-announced an upcoming critically rated vulnerability patch to be released on Nov. 1, 2022. What’s going on? ...

Agent Tesla RAT Delivered by Quantum Builder With New TTPs

|
Zscaler ThreatLabz has observed a campaign that delivers Agent Tesla, a .NET based keylogger and remote access trojan (RAT) active since 2014, using a builder named “Quantum Builder” sold on the dark ...