Emulating the Petrifying Medusa Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by Medusa ransomware since the beginning of its activities in June 2021. Medusa is predominantly propagated through the exploitation of ...
event logging, CISA, living off the land

Event Logging Key to Detecting LOTL Attacks, Security Agencies Say

A report by CISA, the FBI, the NSA, and international agencies lay out the argument that event logging tools help enterprises better detect attacks that rely on LOTL techniques used by threat ...
Security Boulevard

Emulating Sandworm’s Prestige Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by Prestige ransomware since the beginning of its activities in October 2022. Prestige has been observed targeting organizations in the ...
a USB drive

A Major Industrial Cybersecurity Threat: Living off the Land Attacks

In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Security Boulevard

Introduction to Living Off the Land (LotL) Attacks

Living off the Land (LotL) attacks represent a sophisticated cyber threat strategy where attackers use legitimate tools and processes, known as LOLBins (Living Off the Land Binaries), to execute malicious activities. This ...

The Shape Shifting Cameleon: QakBot

QakBot, also recognized as Qbot, Quackbot, Pinkslipbot, and TA570, has etched its name among other cyber threats, leaving a trail of thousands of malware infections globally. Dive in as we explore QakBot’s ...
🥇

Cyber Security DE:CODED – Security opportunities for Managed Service Providers

“Every SMB is an expert in something. A passion. It’s probably not anti-virus…” Show notes for series 2, episode 7 Small business and Managed Service Provider special! In June 2022*, we set ...
wormgpt, CaaS, Darktrace, Malware, cyberattacks, attacks, malware, environment data cyberattacks defend wiper hermeticwiper malware wiper file systems storage Zerologon

Defend Your IT Environment from Living-Off-the-Land (LOL) Techniques

As cyberattacks increase in frequency and sophistication, it is vital for organizations to defend their environments and be prepared for malicious actors inside their networks. Indeed, much as a parasite feeds off ...
Security Boulevard
Congratulations, You’ve Won a Meterpreter Shell

Congratulations, You’ve Won a Meterpreter Shell

Posted by Josh Stroschein, Ratnesh Pandey and Alex Holland. For an attack to succeed undetected, attackers need to limit the creation of file and network artifacts by their malware. In this post, ...
Separ Infostealer Using “Living off the Land” Tactics to Target Businesses

Separ Infostealer Using “Living off the Land” Tactics to Target Businesses

The Separ infostealer is using what’s known as “Living off the Land” tactics to target businesses as part of an ongoing attack campaign. Digital security company Deep Instinct detected the campaign and ...