Volt Typhoon Malware: US Critical Infrastructure Breached

In a recent revelation, the U.S. government disclosed that the Chinese state-sponsored hacking group, Volt Typhoon has surreptitiously infiltrated critical infrastructure networks within the country for a staggering five-year period. This embedded ...

Zardoor Backdoor Alert: Threat Actors Target Islamic Charity

In recent cyber threat intelligence developments, an unnamed Islamic non-profit organization based in Saudi Arabia has fallen victim to a covert cyber-espionage campaign employing a previously unknown backdoor named Zardoor. Discovered by ...
APT AiTM quantum attacks Raspberry Robin APT29 ransomware NATO Barracuda Networks ATO Attacks

Report Sees Chinese Threat Actors Embracing Sandman APT

SentinelLabs, Microsoft and PwC issued an alert that threat actors thought to be associated with cybercriminals based in China adopted an APT known as Sandman to insert malware in IT environments ...
Security Boulevard
The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: Application security, cybersecurity, ...
The 3CX attack gets wilder, marks first 'cascading software supply chain compromise'

The 3CX attack gets wilder, marks first ‘cascading software supply chain compromise’

Security firm Mandiant Consulting released a report Wednesday that traced the breach at 3CX back to yet another supply chain-compromised application: X-Trader, a derivatives trading software application manufactured by the firm Trading ...

Another Malware with Persistence

Here’s a piece of Chinese malware that infects SonicWall security appliances and survives firmware updates. On Thursday, security firm Mandiant published a report that said threat actors with a suspected nexus to ...
Meet the Latest Update to ReversingLabs Elastic Threat Infrastructure

Meet the Latest Update to ReversingLabs Elastic Threat Infrastructure

ReversingLabs is proud to announce new and enhanced features for ReversingLabs Elastic Threat Infrastructure (TitaniumScale). This product helps enterprises assess millions of files per day to quickly find and prioritize threats for ...
Meet the Latest Update to ReversingLabs Elastic Threat Infrastructure

Meet the Latest Update to ReversingLabs Elastic Threat Infrastructure

ReversingLabs is proud to announce new and enhanced features for ReversingLabs Elastic Threat Infrastructure (TitaniumScale). This product helps enterprises assess millions of files per day to quickly find and prioritize threats for ...
Iran-backed APT actors utilize CVEs to carry out cyber attacks on critical infrastructure

Iran-backed APT actors utilize CVEs to carry out cyber attacks on critical infrastructure

An advisory co-authored by the U.S., U.K., Canada and Australia warns of an Iran-backed APT group utilizing known vulnerabilities to carry out attacks.  ...
™

Characteristics and Challenges of Advanced Persistent Threats (APTs)

Advanced Persistent Threats (APTs) are sophisticated, often multi-component network attacks that, by definition, often go undetected for quite some time ...