Volt Typhoon Malware: US Critical Infrastructure Breached

In a recent revelation, the U.S. government disclosed that the Chinese state-sponsored hacking group, Volt Typhoon has surreptitiously infiltrated critical infrastructure networks within the country for a staggering five-year period. This embedded ...

Zardoor Backdoor Alert: Threat Actors Target Islamic Charity

In recent cyber threat intelligence developments, an unnamed Islamic non-profit organization based in Saudi Arabia has fallen victim to a covert cyber-espionage campaign employing a previously unknown backdoor named Zardoor. Discovered by ...

JinxLoader Malware: Next-Stage Payload Threats Revealed

In the ever-evolving landscape of cybersecurity, a recent discovery by Palo Alto Networks Unit 42 and Symantec sheds light on a new Go-based malware loader named JinxLoader malware. This sophisticated tool is ...
Killnet: Inside the World’s Most Prominent Pro-Kremlin Hacktivist Collective

Killnet: Inside the World’s Most Prominent Pro-Kremlin Hacktivist Collective

Well-known pro-Kremlin hactivist group Killnet has been noted for its level of activity and ambition, especially since the outbreak of the Russia-Ukraine war. The post Killnet: Inside the World’s Most Prominent Pro-Kremlin ...
Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials

Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials

2022 has been an auspicious year for threat actors and Advanced Persistent Threat (APT) groups targeting Australia, with adversaries stealing over 50 million credentials and personal information—a 99 percent increase compared to ...
DPRK Advisory: How to Better Protect Your Organization From State-Sponsored Ransomware

DPRK Advisory: How to Better Protect Your Organization From State-Sponsored Ransomware

A new advisory outlines the TTPs state-sponsored DPRK cyber threat actors use to hold organizations ransom. Here’s our guidance on ransomware prevention, readiness, and response. The post DPRK Advisory: How to Better ...
How VulnDB Is Helping Organizations Prevent Future Ransomware Attacks

How VulnDB Is Helping Organizations Prevent Future Ransomware Attacks

For over 300,000 vulnerabilities, Flashpoint now provides our Ransomware Likelihood score. This capability can only be found in VulnDB, the most comprehensive source of vulnerability intelligence available. The post How VulnDB Is ...
Timeline: CISA and the Biden Administration’s Impact on Cybersecurity

Timeline: CISA and the Biden Administration’s Impact on Cybersecurity

The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through with plans to implement new mandates intended, hone regulations, and improve the nation’s security posture. The post ...
Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found

Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found

An Advanced Persistent Threat (APT) is a malicious actor who possesses extraordinary skill and resources—enabling them to infiltrate and exfiltrate an organizations’ network. The post Advanced Persistent Threat (APT) Groups: What Are ...
Combining Cybersecurity with Gaming: Cheats, Insider Threats, Ransomware and More

Combining Cybersecurity with Gaming: Cheats, Insider Threats, Ransomware and More

The video game industry has grown considerably since its introduction in the early 1970s, with analysts believing the market to be worth $321 billion by 2026. As such, the gaming industry faces ...