Episode 16

Episode 16

| | Upcoming Podcast
JOIN US FOR AN EVENING OF THREAT HUNTING FUN! Cyborg Security has launched a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they ... Read More

CVE-2024-3400 – Palo Alto OS Command Injection Vulnerability

Threat Overview – CVE-2024-3400 – Palo Alto OS Command Injection Vulnerability CVE-2024-3400 is a unauthenticated remote code execution vulnerability identified in devices utilizing GlobalProtect, and was identified by Volexity Threat Researchers on April of 2024. Reported to impact PAN-OS firewalls running versions 10.2, 11.0 and 11.1, this security flaw has ... Read More
SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos

SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos

| | library, White Paper
Discover the Cutting-Edge of Cybersecurity in the “SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos” Are you navigating the complexities of threat hunting in today’s chaotic cyber landscape? SANS’s ninth annual Threat Hunting Survey offers unparalleled insights into the evolving practices, challenges, and methodologies shaping cybersecurity strategies across ... Read More

Volt Typhoon: Advisory Update

Threat Overview – Volt Typhoon Threat Group On Tuesday (3/19/24), an advisory from President Biden’s administration was released to state governors, detailing the threat of foreign entities including the Volt Typhoon group targeting critical drinking water and wastewater infrastructure – with the potential to “disrupt the critical lifeline of clean ... Read More

Threat-Informed Defense through Behavioral Threat Hunting

| | Blog
In the cybersecurity domain, the evolution from a purely reactive stance to a proactive, anticipatory approach encapsulates the transition to a Threat-Informed Defense strategy. This paradigm shift, underscored by the sophisticated methodology of Behavioral Threat Hunting, represents a critical juncture in cybersecurity’s maturation. Unlike conventional strategies anchored in the deployment ... Read More

Phobos Unleashed: Navigating the Maze of Ransomware’s Ever-Evolving Threat

Threat Overview – Phobos The Phobos Ransomware variant has been active since May of 2019, targeting a variety of entities that include governments, emergency services, critical infrastructure, education and public healthcare. Operating under a RaaS (Ransomware-as-a-Service) model, this ransomware variant has been responsible for the extortion of millions of dollars ... Read More
Episode 15

Episode 15

JOIN US FOR AN EVENING OF THREAT HUNTING FUN! Cyborg Security has launched a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they ... Read More

DarkCasino Strikes: Unveiling the Cyber Shadows of Water Hydra

| | Community Content
Threat Overview – DarkCasino The APT group, DarkCasino (also known as Water Hydra), has been in the wild since 2021 and has had operations observed targeting online trading platforms in Asia, the Middle East, and Europe. Examples of the specific targets are gambling websites, casinos, banks, cryptocurrency and stock trading ... Read More
Threat Hunting Workshop 10: Hunting for Initial Access

Threat Hunting Workshop 10: Hunting for Initial Access

Get ready to elevate your threat hunting skills with Cyborg Security’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Initial Access. This isn’t just another workshop; it’s an opportunity to immerse yourself in the world of advanced threat hunting, guided by the expertise of Cyborg Security’s seasoned ... Read More

MonikerLink: Outlook’s Achilles’ Heel, Navigating the Perilous Waters of CVE-2024-21413

| | Community Content
Threat Overview – #MonikerLink CVE-2024-21413 (MonikerLink) is a critical security vulnerability in the Microsoft Outlook software. This vulnerability, released by CheckPoint and Microsoft in February 2024, is suspected to impact all prior versions of Microsoft Outlook due to the method in which it interacts with COM API’s. CheckPoint research stated ... Read More