Unraveling Phishing SMS Campaigns: A Collaborative Success Story
A recent operation against phishing SMS campaigns in the UK, shared via a tweet by Jake from JCyberSec_ (@JCyberSec_) and a LinkedIn post by the Dedicated Card and Payment Crime…
A recent operation against phishing SMS campaigns in the UK, shared via a tweet by Jake from JCyberSec_ (@JCyberSec_) and a LinkedIn post by the Dedicated Card and Payment Crime…
On July 24, 2023, the Norwegian government announced that its ICT platform, used by 12 of its ministries, had been compromised in a cyberattack. The attack was carried out by…
A recent oss-security list post from Tavis Ormandy has brought attention to a use-after-free vulnerability, CVE-2023-20593, in AMD Zen2 processors.
In the digital age, the fight against child abuse has taken on new dimensions. One of the most innovative approaches to this issue is the “Stop Child Abuse – Trace…
The UK Further and Higher Education sectors are increasingly becoming targets for cyber-attacks. These attacks range from opportunistic ransomware operations to more sophisticated Advanced Persistent Threat (APT) groups. This report…
Online and at conferences, people ask me how to get started in threat intel. What I usually offer as advice to budding analysts starting out is to practise analysing things…
The Evasive Panda Advanced Persistent Threat (APT) group, also known as BRONZE HIGHLAND and Daggerfly, has been active since at least 2012. This Chinese-speaking APT group has been conducting cyberespionage…
Insider threats are a significant cybersecurity risk that originates from within an organisation. These threats can come from current or former employees, contractors, or anyone else with intimate knowledge of…
In a recent blog post by Mandiant, a cybersecurity firm, they highlighted the potential risks associated with third-party Windows installers. The post emphasizes how threat actors can exploit these installers…
In the ever-evolving landscape of cyber threats, the UAC-0006 threat actor group has recently resurfaced with a new wave of attacks. This time, they're deploying the SmokeLoader malware through a…