Akamai Says Ransomware Landscape Keep Evolves

Akamai Says Ransomware Landscape Keep Evolves

Ransomware operators are moving away from using traditional phishing techniques and are placing more importance on exploiting vulnerabilities. These groups have adopted a more aggressive approach in their efforts to…
Tropical Scorpius uses new TTP’s

Tropical Scorpius uses new TTP’s

Researchers from Unit42 has revealed that hackers are employing previously unseen TTP's of the Cuba ransomware, including a novel RAT and a new local privilege escalation tool dubbed as Tropical…

Ways ! Linux Shell Evades Analysis

Cybercriminals can be often seen employing Linux shell scripts for various tasks, such as disabling firewalls, monitoring agents, and modifying Access Control Lists (ACLs). Researchers published a report that describes…

Cyber Threat Intelligence

With cyber threats becoming increasingly difficult to track and manage, proactive security approach must be taken in order to protect their assets from a breach. This requires ongoing visibility into…
Hades Ransomware Identity

Hades Ransomware Identity

A group of researchers has discovered the identity of the operators behind the Hades ransomware spotted in December 2020 after attacks on multiple organizations. Newly discovered adversary as Gold Winter,…