From recordedfuture.com
OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen | Recorded Future
1 1
Discover how OilAlpha's malicious applications are targeting humanitarian aid groups in Yemen. Learn about their tactics and how to mitigate risks.
18h ago
From recordedfuture.com
CVE-2024-6505 Description, Impact and Technical Details
0 1
CVE-2024-6505 is a vulnerability that affects the virtio-net device in QEMU. It occurs when the RSS feature on the virtio-net network card is enabled,…
on Sat, 4PM
From recordedfuture.com
CVE-2024-6524 Description, Impact and Technical Details
0 1
CVE-2024-6524 is a vulnerability found in ShopXO versions up to 6.1.0, which has been classified as critical. The vulnerability affects an unknown fun…
on Sat, 4PM
From recordedfuture.com
CVE-2024-6526 Description, Impact and Technical Details
0 1
A vulnerability, identified as CVE-2024-6526, has been discovered in CodeIgniter Ecommerce-CodeIgniter-Bootstrap version up to 1998845073cf433bc6c250b…
on Sat, 4PM
From recordedfuture.com
CVE-2024-6523 Description, Impact and Technical Details
0 1
CVE-2024-6523 is a vulnerability found in ZKTeco BioTime up to version 9.5.2, affecting the unknown function of the system-group-add Handler component…
on Sat, 4PM
From recordedfuture.com
Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers | Recorded Future
0 0
Discover how Recorded Future uses infostealer logs to identify CSAM consumers and trends. Learn key findings and mitigation strategies.
on Jul 2
From recordedfuture.com
Sombres Influences: Russian and Iranian Influence Networks Target French Elections | Recorded Future
0 0
Insikt Group identifies Russian and Iranian influence operations targeting the French elections, highlighting negligible impact but the need to continue monitoring.
on Jun 28
From recordedfuture.com
CVE-2024-6062 Description, Impact and Technical Details
0 0
CVE-2024-6062 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master, specifically affecting the function swf_svg_add_iso_sample of the fil…
on Jun 26
From recordedfuture.com
RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates | Recorded Future
0 0
Discover how RansomHub's ransomware-as-a-service targets Windows, Linux, and ESXi systems.
on Jun 26
From recordedfuture.com
CVE-2024-6063 Description, Impact and Technical Details
0 0
CVE-2024-6063 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master, specifically in the function m2tsdmx_on_event of the file src/filters…
on Jun 26
From recordedfuture.com
CVE-2024-6065 Description, Impact and Technical Details
0 0
CVE-2024-6065 is a critical vulnerability found in itsourcecode Bakery Online Ordering System 1.0. The vulnerability allows for remote SQL injection t…
on Jun 26
From recordedfuture.com
CVE-2024-6080 Description, Impact and Technical Details
0 0
A critical vulnerability, CVE-2024-6080, has been discovered in Intelbras InControl 2.21.56. The vulnerability involves an unquoted search path manipu…
on Jun 26
From recordedfuture.com
CVE-2024-6067 Description, Impact and Technical Details
0 0
CVE-2024-6067 is a critical vulnerability found in SourceCodester Music Class Enrollment System 1.0. The vulnerability allows for SQL injection throug…
on Jun 26
From recordedfuture.com
CVE-2024-6082 Description, Impact and Technical Details
0 0
CVE-2024-6082 is a vulnerability found in PHPVibe 11.0.46, specifically in the processing of the file functionalities.global.php of the Global Options…
on Jun 26
From recordedfuture.com
CVE-2024-6066 Description, Impact and Technical Details
0 0
CVE-2024-6066 is a critical vulnerability that has been discovered in SourceCodester Best House Rental Management System 1.0. It affects an unknown fu…
on Jun 26
From recordedfuture.com
CVE-2024-6064 Description, Impact and Technical Details
0 0
CVE-2024-6064 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master, specifically affecting the function xmt_node_end of the file src/scen…
on Jun 26
From recordedfuture.com
0 0
Discover how Vortax, a fake meeting software, spreads infostealers targeting cryptocurrency users, compromising macOS security. Learn more.
on Jun 26
From recordedfuture.com
Israel-Hamas Conflict and US Elections Drive Violent Extremist Threats in 2024 | Recorded Future
0 0
Explore how the Israel-Hamas conflict and the US presidential election may drive violent extremist threats in 2024. Discover key findings and mitigation strategies.
on Jun 25
From recordedfuture.com
Russia-Linked CopyCop Expands to Cover US Elections, Target Political Leaders | Recorded Future
0 0
Discover how the Russia-linked CopyCop network uses AI to influence the 2024 US elections and target political leaders. Learn more.
on Jun 25
From recordedfuture.com
0 0
Discover how RedJuliett, a Chinese state-sponsored group, targets Taiwan's government, academia, and tech sectors via network perimeter exploitation.
on Jun 24
From recordedfuture.com
CVE-2024-6061 Description, Impact and Technical Details
0 0
CVE-2024-6061 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master. The vulnerability affects the function isoffin_process of the file sr…
on Jun 18
From recordedfuture.com
CVE-2024-6058 Description, Impact and Technical Details
0 0
CVE-2024-6058 is a vulnerability found in LabVantage LIMS 2017, affecting an unknown part of the file /labvantage/rc?command=page&page=SampleHistorica…
on Jun 18
From recordedfuture.com
Hurdling Over Hazards: Multifaceted Threats to the Paris Olympics | Recorded Future
0 0
Discover the 2024 Paris Olympic Games' threats, including cyberattacks, espionage, and physical security risks, with insights from Insikt Group's latest research.
on Jun 5
From recordedfuture.com
GRU's BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Camp | Recorded Future
0 0
Discover BlueDelta’s (APT28, FANCY BEAR, Forest Blizzard) strategic espionage tactics in Europe. Learn more.
on May 30
From recordedfuture.com
GitCaught: Threat Actor Leverages GitHub Repository for Malicious Infrastructure | Recorded Future
0 0
Discover how Russian-speaking hackers leverage GitHub to host malware disguised as legitimate software. Explore the campaign, implications, and protection strategies.
on May 21
From recordedfuture.com
Exploring the Depths of SolarMarker's Multi-tiered Infrastructure | Recorded Future
0 0
Uncover SolarMarker’s multi-tiered infrastructure and its impact on sectors like education, healthcare, and government. Learn more.
on May 13
From recordedfuture.com
Russia-Linked CopyCop Uses LLMs to Weaponize Influence Content at Scale | Recorded Future
0 0
Insikt Group shares research on CopyCop: a Russian-linked network using AI for disinformation to influence US, UK, and French politics. Dive into the details.
on May 9
From recordedfuture.com
0 0
Explore how Iran-aligned Emerald Divide exploits the Israel-Hamas conflict in an ongoing influence campaign to deepen divisions within Israeli society.
on May 8
From recordedfuture.com
0 0
Explore the escalating threat of 'Mobile NotPetya'—a zero-click, wormable mobile malware. Learn about the surge in vulnerabilities and the critical need for robust defense.
on Apr 16
From recordedfuture.com
Cybercriminal Campaign Spreads Infostealers, Highlighting Risks to Web3 Gaming | Recorded Future
0 0
Insikt Group reveals a Russian-language cybercrime operation leveraging counterfeit Web3 gaming projects to deploy malware targeting macOS and Windows users for data theft.
on Apr 15
From recordedfuture.com
2023 Threat Analysis and 2024 Predictions | Recorded Future
0 0
Explore the evolving cybercrime landscape with our 2023 Annual Report, offering a detailed analysis of adversary tactics and insights into the cyber threat landscape. Gain a 360-degree perspective to enhance your security operations and strategies, backed by expert predictions for 2024.
on Apr 9
From recordedfuture.com
Violent Extremists Dox Executives, Enabling Physical Threats | Recorded Future
0 0
Domestic violent extremists are increasingly doxing senior U.S. leaders — publishing their personally identifiable information without their consent and with malicious intent.
on Mar 27
From recordedfuture.com
2023 Annual Report | Recorded Future
0 0
Insikt Group analyzes cyber threat and geopolitical trends observed throughout 2023 and provides a comprehensive overview of the cyber threat landscape.
on Mar 21
From recordedfuture.com
Attributing I-SOON: Private Contractor Linked to Multiple Chinese State-sponsored Groups
0 0
Insikt Group uncovers ties between I-SOON and multiple Chinese state-sponsored cyber groups like RedAlpha and RedHotel.
on Mar 20
From recordedfuture.com
Adversarial Intelligence: Red Teaming Malicious Use Cases for AI
0 0
Recorded Future tested four malicious use cases for artificial intelligence (AI) to illustrate “the art of the possible” for threat actor use.
on Mar 19
From recordedfuture.com
What is Old is New Again: Lessons in Anti-Ransom Policy | Recorded Future
0 0
Dive into the parallels between traditional kidnapping and ransomware to explore effective anti-ransom policies and historical lessons for today's digital threats.
on Mar 7
From recordedfuture.com
Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices
0 0
Following a string of major public disclosures, Insikt Group has identified new infrastructure associated with operators of the mercenary mobile spyware Predator.
on Mar 2
From recordedfuture.com
Russia Seeks to Exploit Western "War Fatigue" to Win in Ukraine
0 0
Russia aims to influence 2024 Western elections, exploiting "war fatigue" over Ukraine aid to sway opinions and outcomes. Learn how Moscow leverages data and strategies to shape global politics.
on Mar 2
From recordedfuture.com
0 0
Insikt Group has observed TAG-70 leveraging cross-site scripting (XSS) vulnerabilities against Roundcube webmail servers in Europe, targeting government, military, and national infrastructure.
on Feb 17
From recordedfuture.com
Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017–2023
0 0
Discover key insights from Insikt Group's analysis on ransomware exploitation patterns and targets from 2017–2023.
on Feb 8
From recordedfuture.com
What is the Cyber Kill Chain? Phases and Process Explained
0 0
The cyber kill chain process outlines phases from reconnaissance to data exfiltration, aiding in tackling ransomware and APTs. Click here to learn more.
on Feb 6
From recordedfuture.com
Leaks and Revelations: A Web of IRGC Networks and Cyber Companies
0 0
Iranian intelligence and military, along with contractors, target democratic processes in Western countries, including the 2020 US election.
on Jan 25
From recordedfuture.com
Flying Under the Radar: Abusing GitHub for Malicious Infrastructure | Recorded Future
0 0
Discover how GitHub is increasingly exploited for cyberattacks in our latest report.
on Jan 23
From recordedfuture.com
2023 Adversary Infrastructure Report | Recorded Future
0 0
Recorded Future’s Insikt Group conducted a study of malicious command-and-control (C2) infrastructure identified using proactive scanning and collection methods throughout 2023.
on Jan 22
From recordedfuture.com
Annual Payment Fraud Intelligence Report: 2023 | Recorded Future
0 0
2023's payment fraud trends predict a persistent underground market and evolving sophisticated cyber-fraud threats in 2024.
on Dec 21
From recordedfuture.com
Aggressive Malign Influence Threatens to Shape US 2024 Elections | Recorded Future
0 0
Russia, China, Iran, domestic violent extremists (DVEs), and hacktivist groups will very likely conduct influence operations at varying levels of magnitude and sophistication to shape or disrupt the United States (US) 2024 elections in pursuit of strategic geopolitical goals.
on Dec 14
From recordedfuture.com
Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics
0 0
Insikt Group® tracks ongoing malign influence activity by Russia-linked Doppelgänger network, targeting Ukrainian, US, and German audiences via fake news sites and social media.
on Dec 5
From recordedfuture.com
Crypto Country: North Korea’s Targeting of Cryptocurrency | Recorded Future
0 0
In a new report, Recorded Future’s Insikt Group examines North Korea’s success in its cybercriminal operations targeting the cryptocurrency industry.
on Nov 30
From recordedfuture.com
The 4th in the 5th: Temporal Aspects of Cyber Operations | Recorded Future
0 0
Time is the enemy. Until cybersecurity is perfect, the cyclical nature of breaches and discovery means that time will betray both defenders and attackers.
on Nov 23
From recordedfuture.com
Charting China’s Climb as a Leading | Recorded Future Global Cyber Power
0 0
Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.
on Nov 7