• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From recordedfuture.com

OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen | Recorded Future

1 1

Discover how OilAlpha's malicious applications are targeting humanitarian aid groups in Yemen. Learn about their tactics and how to mitigate risks.

18h ago

From recordedfuture.com

CVE-2024-6505 Description, Impact and Technical Details

0 1

CVE-2024-6505 is a vulnerability that affects the virtio-net device in QEMU. It occurs when the RSS feature on the virtio-net network card is enabled,…

on Sat, 4PM

From recordedfuture.com

CVE-2024-6524 Description, Impact and Technical Details

0 1

CVE-2024-6524 is a vulnerability found in ShopXO versions up to 6.1.0, which has been classified as critical. The vulnerability affects an unknown fun…

on Sat, 4PM

From recordedfuture.com

CVE-2024-6526 Description, Impact and Technical Details

0 1

A vulnerability, identified as CVE-2024-6526, has been discovered in CodeIgniter Ecommerce-CodeIgniter-Bootstrap version up to 1998845073cf433bc6c250b…

on Sat, 4PM

From recordedfuture.com

CVE-2024-6523 Description, Impact and Technical Details

0 1

CVE-2024-6523 is a vulnerability found in ZKTeco BioTime up to version 9.5.2, affecting the unknown function of the system-group-add Handler component…

on Sat, 4PM

From recordedfuture.com

Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers | Recorded Future

0 0

Discover how Recorded Future uses infostealer logs to identify CSAM consumers and trends. Learn key findings and mitigation strategies.

on Jul 2

From recordedfuture.com

Sombres Influences: Russian and Iranian Influence Networks Target French Elections | Recorded Future

0 0

Insikt Group identifies Russian and Iranian influence operations targeting the French elections, highlighting negligible impact but the need to continue monitoring.

on Jun 28

From recordedfuture.com

CVE-2024-6062 Description, Impact and Technical Details

0 0

CVE-2024-6062 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master, specifically affecting the function swf_svg_add_iso_sample of the fil…

on Jun 26

From recordedfuture.com

RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates | Recorded Future

0 0

Discover how RansomHub's ransomware-as-a-service targets Windows, Linux, and ESXi systems.

on Jun 26

From recordedfuture.com

CVE-2024-6063 Description, Impact and Technical Details

0 0

CVE-2024-6063 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master, specifically in the function m2tsdmx_on_event of the file src/filters…

on Jun 26

From recordedfuture.com

CVE-2024-6065 Description, Impact and Technical Details

0 0

CVE-2024-6065 is a critical vulnerability found in itsourcecode Bakery Online Ordering System 1.0. The vulnerability allows for remote SQL injection t…

on Jun 26

From recordedfuture.com

CVE-2024-6080 Description, Impact and Technical Details

0 0

A critical vulnerability, CVE-2024-6080, has been discovered in Intelbras InControl 2.21.56. The vulnerability involves an unquoted search path manipu…

on Jun 26

From recordedfuture.com

CVE-2024-6067 Description, Impact and Technical Details

0 0

CVE-2024-6067 is a critical vulnerability found in SourceCodester Music Class Enrollment System 1.0. The vulnerability allows for SQL injection throug…

on Jun 26

From recordedfuture.com

CVE-2024-6082 Description, Impact and Technical Details

0 0

CVE-2024-6082 is a vulnerability found in PHPVibe 11.0.46, specifically in the processing of the file functionalities.global.php of the Global Options…

on Jun 26

From recordedfuture.com

CVE-2024-6066 Description, Impact and Technical Details

0 0

CVE-2024-6066 is a critical vulnerability that has been discovered in SourceCodester Best House Rental Management System 1.0. It affects an unknown fu…

on Jun 26

From recordedfuture.com

CVE-2024-6064 Description, Impact and Technical Details

0 0

CVE-2024-6064 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master, specifically affecting the function xmt_node_end of the file src/scen…

on Jun 26

From recordedfuture.com

The Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications | Recorded Future

0 0

Discover how Vortax, a fake meeting software, spreads infostealers targeting cryptocurrency users, compromising macOS security. Learn more.

on Jun 26

From recordedfuture.com

Israel-Hamas Conflict and US Elections Drive Violent Extremist Threats in 2024 | Recorded Future

0 0

Explore how the Israel-Hamas conflict and the US presidential election may drive violent extremist threats in 2024. Discover key findings and mitigation strategies.

on Jun 25

From recordedfuture.com

Russia-Linked CopyCop Expands to Cover US Elections, Target Political Leaders | Recorded Future

0 0

Discover how the Russia-linked CopyCop network uses AI to influence the 2024 US elections and target political leaders. Learn more.

on Jun 25

From recordedfuture.com

Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation | Recorded Future

0 0

Discover how RedJuliett, a Chinese state-sponsored group, targets Taiwan's government, academia, and tech sectors via network perimeter exploitation.

on Jun 24

From recordedfuture.com

CVE-2024-6061 Description, Impact and Technical Details

0 0

CVE-2024-6061 is a vulnerability found in GPAC 2.5-DEV-rev228-g11067ea92-master. The vulnerability affects the function isoffin_process of the file sr…

on Jun 18

From recordedfuture.com

CVE-2024-6058 Description, Impact and Technical Details

0 0

CVE-2024-6058 is a vulnerability found in LabVantage LIMS 2017, affecting an unknown part of the file /labvantage/rc?command=page&page=SampleHistorica…

on Jun 18

From recordedfuture.com

Hurdling Over Hazards: Multifaceted Threats to the Paris Olympics | Recorded Future

0 0

Discover the 2024 Paris Olympic Games' threats, including cyberattacks, espionage, and physical security risks, with insights from Insikt Group's latest research.

on Jun 5

From recordedfuture.com

GRU's BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Camp | Recorded Future

0 0

Discover BlueDelta’s (APT28, FANCY BEAR, Forest Blizzard) strategic espionage tactics in Europe. Learn more.

on May 30

From recordedfuture.com

GitCaught: Threat Actor Leverages GitHub Repository for Malicious Infrastructure | Recorded Future

0 0

Discover how Russian-speaking hackers leverage GitHub to host malware disguised as legitimate software. Explore the campaign, implications, and protection strategies.

on May 21

From recordedfuture.com

Exploring the Depths of SolarMarker's Multi-tiered Infrastructure | Recorded Future

0 0

Uncover SolarMarker’s multi-tiered infrastructure and its impact on sectors like education, healthcare, and government. Learn more.

on May 13

From recordedfuture.com

Russia-Linked CopyCop Uses LLMs to Weaponize Influence Content at Scale | Recorded Future

0 0

Insikt Group shares research on CopyCop: a Russian-linked network using AI for disinformation to influence US, UK, and French politics. Dive into the details.

on May 9

From recordedfuture.com

Iran-Aligned Emerald Divide Influence Campaign Evolves to Exploit Israel-Hamas Conflict | Recorded Future

0 0

Explore how Iran-aligned Emerald Divide exploits the Israel-Hamas conflict in an ongoing influence campaign to deepen divisions within Israeli society.

on May 8

From recordedfuture.com

“Mobile NotPetya”: Spyware Zero-Click Exploit Development Increases Threat of Wormable Mobile Malware

0 0

Explore the escalating threat of 'Mobile NotPetya'—a zero-click, wormable mobile malware. Learn about the surge in vulnerabilities and the critical need for robust defense.

on Apr 16

From recordedfuture.com

Cybercriminal Campaign Spreads Infostealers, Highlighting Risks to Web3 Gaming | Recorded Future

0 0

Insikt Group reveals a Russian-language cybercrime operation leveraging counterfeit Web3 gaming projects to deploy malware targeting macOS and Windows users for data theft.

on Apr 15

From recordedfuture.com

2023 Threat Analysis and 2024 Predictions | Recorded Future

0 0

Explore the evolving cybercrime landscape with our 2023 Annual Report, offering a detailed analysis of adversary tactics and insights into the cyber threat landscape. Gain a 360-degree perspective to enhance your security operations and strategies, backed by expert predictions for 2024.

on Apr 9

From recordedfuture.com

Violent Extremists Dox Executives, Enabling Physical Threats | Recorded Future

0 0

Domestic violent extremists are increasingly doxing senior U.S. leaders — publishing their personally identifiable information without their consent and with malicious intent.

on Mar 27

From recordedfuture.com

2023 Annual Report | Recorded Future

0 0

Insikt Group analyzes cyber threat and geopolitical trends observed throughout 2023 and provides a comprehensive overview of the cyber threat landscape.

on Mar 21

From recordedfuture.com

Attributing I-SOON: Private Contractor Linked to Multiple Chinese State-sponsored Groups

0 0

Insikt Group uncovers ties between I-SOON and multiple Chinese state-sponsored cyber groups like RedAlpha and RedHotel.

on Mar 20

From recordedfuture.com

Adversarial Intelligence: Red Teaming Malicious Use Cases for AI

0 0

Recorded Future tested four malicious use cases for artificial intelligence (AI) to illustrate “the art of the possible” for threat actor use.

on Mar 19

From recordedfuture.com

What is Old is New Again: Lessons in Anti-Ransom Policy | Recorded Future

0 0

Dive into the parallels between traditional kidnapping and ransomware to explore effective anti-ransom policies and historical lessons for today's digital threats.

on Mar 7

From recordedfuture.com

Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices

0 0

Following a string of major public disclosures, Insikt Group has identified new infrastructure associated with operators of the mercenary mobile spyware Predator.

on Mar 2

From recordedfuture.com

Russia Seeks to Exploit Western "War Fatigue" to Win in Ukraine

0 0

Russia aims to influence 2024 Western elections, exploiting "war fatigue" over Ukraine aid to sway opinions and outcomes. Learn how Moscow leverages data and strategies to shape global politics.

on Mar 2

From recordedfuture.com

Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign

0 0

Insikt Group has observed TAG-70 leveraging cross-site scripting (XSS) vulnerabilities against Roundcube webmail servers in Europe, targeting government, military, and national infrastructure.

on Feb 17

From recordedfuture.com

Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017–2023

0 0

Discover key insights from Insikt Group's analysis on ransomware exploitation patterns and targets from 2017–2023.

on Feb 8

From recordedfuture.com

What is the Cyber Kill Chain? Phases and Process Explained

0 0

The cyber kill chain process outlines phases from reconnaissance to data exfiltration, aiding in tackling ransomware and APTs. Click here to learn more.

on Feb 6

From recordedfuture.com

Leaks and Revelations: A Web of IRGC Networks and Cyber Companies

0 0

Iranian intelligence and military, along with contractors, target democratic processes in Western countries, including the 2020 US election.

on Jan 25

From recordedfuture.com

Flying Under the Radar: Abusing GitHub for Malicious Infrastructure | Recorded Future

0 0

Discover how GitHub is increasingly exploited for cyberattacks in our latest report.

on Jan 23

From recordedfuture.com

2023 Adversary Infrastructure Report | Recorded Future

0 0

Recorded Future’s Insikt Group conducted a study of malicious command-and-control (C2) infrastructure identified using proactive scanning and collection methods throughout 2023.

on Jan 22

From recordedfuture.com

Annual Payment Fraud Intelligence Report: 2023 | Recorded Future

0 0

2023's payment fraud trends predict a persistent underground market and evolving sophisticated cyber-fraud threats in 2024.

on Dec 21

From recordedfuture.com

Aggressive Malign Influence Threatens to Shape US 2024 Elections | Recorded Future

0 0

Russia, China, Iran, domestic violent extremists (DVEs), and hacktivist groups will very likely conduct influence operations at varying levels of magnitude and sophistication to shape or disrupt the United States (US) 2024 elections in pursuit of strategic geopolitical goals.

on Dec 14

From recordedfuture.com

Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics

0 0

Insikt Group® tracks ongoing malign influence activity by Russia-linked Doppelgänger network, targeting Ukrainian, US, and German audiences via fake news sites and social media.

on Dec 5

From recordedfuture.com

Crypto Country: North Korea’s Targeting of Cryptocurrency | Recorded Future

0 0

In a new report, Recorded Future’s Insikt Group examines North Korea’s success in its cybercriminal operations targeting the cryptocurrency industry.

on Nov 30

From recordedfuture.com

The 4th in the 5th: Temporal Aspects of Cyber Operations | Recorded Future

0 0

Time is the enemy. Until cybersecurity is perfect, the cyclical nature of breaches and discovery means that time will betray both defenders and attackers.

on Nov 23

From recordedfuture.com

Charting China’s Climb as a Leading | Recorded Future Global Cyber Power

0 0

Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.

on Nov 7