Search results: TTPs

Hunting Operation FlightNight TTPs

Hunting Operation FlightNight TTPs

OverviewOperation FlightNight is one of the latest large attacks utilizing ISOs to trick users into executing malware. This form of phishing has become common over the last few years and is showing ...
Detecting Volt Typhoon TTPs – Security Spotlight

Detecting Volt Typhoon TTPs – Security Spotlight

| | Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. Last week, the ...

Community Content Release: LockBit Tools & TTPs

We recently began publishing Tidal Cyber-authored Objects in our free Community Edition! Curated Objects support research pivoting and easier surfacing of timely threat & TTP intelligence content. If you missed the original ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Actor TTPs & Cyber Threat Intelligence." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Actor TTPs & Cyber Threat Intelligence

| | Blog, CTI Strategies
Intelligence-driven cybersecurity is proactive. And proactive cybersecurity drives better defenses by improving the ability to anticipate threats, increase situational awareness, and reduce attack surfaces.  Today’s cyber threat landscape sees more complex and ...

Snip3 Crypter Reveals New TTPs Over Time

|
Zscaler ThreatLabz researchers observed multiple threat campaigns utilizing the Snip3 crypter, a multi-stage remote access trojan (RAT) loader with new TTPs and available since 2021 as a crypter-as-a-service offering. The Snip3 Crypter ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Tactical Threat Intelligence: Cybercriminals, TTPs, and More." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Tactical Threat Intelligence: Cybercriminals, TTPs, and More

| | Blog, CTI Strategies
Cyber threat intelligence plays a critical role in a proactive cybersecurity strategy. By gathering and analyzing data, security teams and company leaders are able to make quick and effective decisions about cyber ...
challenges, attacks, cybersecurity, risks, industry, Cisco Talos hackers legitimate tools used in cyberattacks

Splunk: Cybercriminals Use These Types of TTPs

A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...
Security Boulevard
The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

| | News & Views
This year has seen an enormous increase in the number and claimed impact of hacktivist attacks on critical infrastructure and enterprises operating in critical services. Many attacks target unmanaged devices such as ...

APT-36 Uses New TTPs and New Tools to Target Indian Governmental Organizations

|
Summary APT-36 (also known as Transparent Tribe) is an advanced persistent threat group attributed to Pakistan that primarily targets users working at Indian government organizations. Zscaler ThreatLabz has been closely monitoring the ...