Jun 14, 2023 | Cybersecurity News, Phishing, Vulnerability
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your...
Jun 7, 2023 | Cybersecurity News, Malware, Ransomware
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your...
May 31, 2023 | Cybersecurity News, Malware, Phishing, Ransomware
Welcome to our weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your...
May 23, 2023 | Cybersecurity News, Malware, Phishing, Ransomware
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your...
May 9, 2023 | Cybersecurity News, Malware, Phishing, Ransomware
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your...
Apr 27, 2023 | Cybersecurity News, Malware, Ransomware
Welcome to our bi-weekly cybersecurity roundup. In these blog posts, we feature curated articles and insights from experts, providing you with valuable information on the latest cybersecurity threats, technologies, and best practices to keep yourself and your...
Mar 28, 2023 | Cybersecurity News, DDoS, Malware, Phishing
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “Earth Preta’s Cyberespionage Campaign Hits Over 200” This study on an active cyberespionage campaign delves into the structure, goals, and...
Mar 15, 2023 | Cybersecurity News, Malware, Ransomware
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “New HiatusRAT Router Malware”, “#StopRansomware: Royal Ransomware” and more. and much more. For more articles, check out our...
Mar 1, 2023 | Cybersecurity News, Malware, Phishing, Ransomware
Over the past two weeks, we saw the new blog from TrendMicro presenting “A deep dive into the evolution of ransomware – Part 1”. Also more relevant news such as “Social engineering – A Coinbase case study”For more articles, check...
Feb 13, 2023 | DDoS, Malware
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “Researchers Uncover 700+ Malicious Open Source Packages”. Also, you will see the “CISA and FBI Release ESXiArgs Ransomware Recovery...
Feb 2, 2023 | Cybersecurity News, Malware, Phishing
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “Hackers now use Microsoft OneNote attachments to spread malware”. Also, you will see the “Massive Campaign Uses Hacked WordPress Sites as...
Jan 17, 2023 | Cybersecurity News, Malware, Phishing, Ransomware
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “Abuse of Telegram bots for credential phishing increased 800% in 2022”, “Bad Paths & The Importance of Using Valid URL Characters”...
Jan 4, 2023 | Cybersecurity News, Malware, Ransomware
Over the past two weeks, we saw the “Microsoft research uncovers new Zerobot capabilities” and also, “IcedID Botnet Distributors Abuse Google PPC to Distribute Malware”. Check out the digested news.For more articles, check out our...
Dec 26, 2022 | Malware Patrol Services
Everyone in our line of business wants to be considered the best threat intelligence vendor. The task of gathering and producing top-notch cyber threat intelligence (CTI) is harder than you might think, however. Here are a few reasons why: (1) It’s literally...
Dec 20, 2022 | Cybersecurity News
Over the past two weeks, we saw “The Twelve Frauds of Christmas – Payment Diversion Fraud” which is a type of fraud where criminals target an individual to divert payments to criminal-controlled bank accounts. Also, we saw the “New MuddyWater...
Dec 7, 2022 | Cybersecurity News, Malware, Ransomware
Over the past two weeks, we selected the cybersecurity highlights such as “Tractors vs. threat actors: How to hack a farm”, “ChatGPT shows promise of using AI to write malware” and more.For more articles, check out our #onpatrol4malware blog....
Nov 23, 2022 | Malware Patrol Services, Press Release
Sharing is Caring To our industry’s credit, there are many good OSINT feeds and data sharing platforms. Even better, they are relatively easy to find. A simple Google search for open source intelligence (OSINT) threat feeds or open source cybersecurity tools...
Nov 22, 2022 | Cybersecurity News, Malware, Phishing
Over the past two weeks, we saw the ultimate Trojan horses “Containers”, the ultimate Trojan horses meant to be immutable. Also, TA542, an actor that distributes Emotet malware, has once again returned from an extensive break from delivering malicious...
Nov 10, 2022 | Cybersecurity News, Malware, Phishing
Over the past two weeks, we saw Emotet botnet starts blasting malware again after 4 month break. The Emotet malware operation is again spamming malicious emails after almost a four-month “vacation†that saw little activity from the notorious cybercrime operation....
Oct 25, 2022 | Cybersecurity News, Malware, Phishing, Ransomware
Over the last two weeks we saw the new Prestige ransomware that impacts organizations in Ukraine and Poland. Also, Cisco Talos discovered a new attack framework including a command and control (C2) tool called Alchimist and a new malware Insekt with remote...
Oct 13, 2022 | Cybersecurity News, Malware, Phishing, Ransomware
Over the last two weeks, we saw the news article from Cisco Talos, they discovered a new remote access trojan (RAT) called MagicRAT, developed and operated by the Lazarus APT group. Also read more about the Shikitega, a new stealthy malware targeting Linux.For more...
Sep 29, 2022 | Cybersecurity News, Malware, Phishing, Ransomware
Over the last two weeks, we saw that while monitoring the Emotet botnet current activity, security researchers found that the Quantum and BlackCat ransomware gangs are now using the malware to deploy their payloads. This and other news you find here.For more articles,...
Sep 12, 2022 | Cybersecurity News, Malware
Over the last two weeks, we saw the new BianLian ransomware gang, used subtle techniques to exploit, enumerate, and move laterally in victim networks to remain undetected and aggressively worked to counter Endpoint Detection & Response (EDR) protections during the...
Sep 5, 2022 | Malware
An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They very efficiently help identify malware samples and standardize the exchange of information among researchers, to name a couple of use...
Aug 31, 2022 | Cybersecurity News, Malware, Phishing, Ransomware
Over the last few weeks the news of hackers build phishing pages using AWS apps. Also find here the threat alert – cloud network bandwidth now stolen through cryptojacking.For more articles, check out our #onpatrol4malware blog. 87% of the ransomware found on...
Aug 16, 2022 | Cybersecurity News, Malware
Over the last two weeks, SC Media shared the top three email-based threats, what they have in common and how you can protect your organization. Also, more details about the Maui ransomware that has been used against US healthcare operations has been linked to...
Aug 1, 2022 | Cybersecurity News, Malware
Over the last two weeks, we saw the DUCKTAIL, infostealer Malware that is targeting Facebook Business Accounts. Also, Palo Alto release the new Incident Response Report 2022.For more articles, check out our #onpatrol4malware blog. The evolution of botnets and DDoS...
Jul 19, 2022 | Cybersecurity News, Malware, Phishing, Ransomware
Over the past two weeks, we saw the news about the infected WordPress site that revealed a malicious C&C script. Also, a new Android malware family on the Google Play Store secretly subscribes users to premium services downloaded over 3,000,000 times. Read this...
Jul 5, 2022 | Cybersecurity News, Malware, Ransomware
Over the last two weeks, we saw that relevant article “Dark Web Price Index 2022” – “As the global health crisis ground on for a second year, many of the trends in Dark Web information product prices and availability continued, too”....
Jun 24, 2022 | Malware, Malware Patrol Services, Phishing, Ransomware
The MISP project is a free open source threat intelligence platform (TIP) that stores, analyzes, and shares information about malware.It is co-financed by the European Union and a wide variety of organizations, including law enforcement agencies, private companies,...
Jun 20, 2022 | Cybersecurity News, Malware, Phishing, Ransomware
Over the last two weeks, we saw that a few months back, researchers discovered a new, undetected malware that acts in this parasitic nature affecting Linux® operating systems. We have aptly named this malware Symbiote. In addition, back from the dead, Emotet returns...
Jun 6, 2022 | Cybersecurity News, Malware, Phishing, Ransomware
Over the last two weeks, we saw the Clipminer malware gang stole $1.7M by hijacking crypto payments. According to researchers from Symantec, a Broadcom company, Clipminer is based on the KryptoCibule malware. In addition, get the latest insights into ransomware...
May 23, 2022 | Cybersecurity News, DDoS, Malware, Malware Patrol Services, Ransomware
Over the past two weeks, we saw The CrowdStrike Falcon OverWatch threat hunting team has uncovered a new and highly sophisticated Internet Information Services (IIS) post-exploitation framework that CrowdStrike refers to as IceApple. Also, 254% increase in activity...
May 9, 2022 | Cybersecurity News, Malware, Ransomware
Over the last two weeks, we saw new LinkedIn scams, where cybercriminals attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform. Also, check out “The Strange Link...
Apr 26, 2022 | Cybersecurity News, Malware, Ransomware
Over the past two weeks, we saw that In February 2022, CISA, FBI, the U.S. CCNMF, the United Kingdom’s NCSC-UK, and NSA released a joint statement regarding their observation of Iranian government-sponsored APT MuddyWater and their malicious cyber activity....