Unmasking Storm-0978: A Cyber Espionage Campaign
In the ever-evolving landscape of cyber threats, a new actor has emerged on the scene: Storm-0978. This group, with its financial and espionage motives, has been conducting a series of…
In the ever-evolving landscape of cyber threats, a new actor has emerged on the scene: Storm-0978. This group, with its financial and espionage motives, has been conducting a series of…
Introduction Zimbra Collaboration Suite (ZCS) is an open-source email collaboration suite widely used by a variety of organizations, including government agencies, universities, and companies. It has been the target of…
Atlassian, a leading provider of team collaboration and productivity software, has recently addressed a high severity Remote Code Execution (RCE) vulnerability in its Confluence Data Center & Server. The vulnerability,…
APT37, also known as Reaper, Group123, Ricochet Chollima, StarCruft, and Scarcruft, is a cyber espionage group that
Introduction APT36, also known as Earth Karkaddan, is a cyber-espionage group that has been active since at least 2016. The group is believed to be based in Pakistan and has…
APT35, also known as Phosphorus, Charming Kitten, and Ajax Security Team, is an Iranian threat actor that has been active since at least 2014. The group has targeted organisations across…
The cybersecurity landscape is a complex and ever-evolving space, with Advanced Persistent Threat (APT) actors and ransomware attackers continuously developing their skills and learning from their mistakes and peers. As…
APT34, also known as OilRig, is a suspected Iranian cyber espionage threat group that has been operational since at least 2014. The group is believed to work on behalf of…
This report aims to provide an analysis of the relationship between former UK Prime Minister Boris Johnson and Evgeny Lebedev, a media mogul and son of a former KGB agent.…
Original Source: GitLab Repository The Vulnerability The issue lies in the “display name” of an email’s “From” header in Outlook. It appears that this display name can be manipulated to…