Search Results for: Advanced Persistent Threat Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It... Blog Post FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think... Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten... Blog Post What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected... Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve... Blog Post InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) Bugs September 9, 2021 Cybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,... Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your... Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed... Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions....
Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Blog Post FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think...
Blog Post Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten...
Blog Post What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected...
Blog Post Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve...
Blog Post InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) Bugs September 9, 2021 Cybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,...
Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your...
Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed...
Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions....