![](https://threatintel-solutions.net/wp-content/uploads/2024/04/Screen-Shot-2024-04-02-at-8.08.14-AM.png)
Author: Tekno Phreak
-
Strela Stealer Targets Europe Stealthily Via WebDav
Strela Stealer, first identified by DCSO in late 2022, is a type of information-stealing malware primarily designed to exfiltrate email…
-
Strela Stealer Targets Europe Stealthily Via WebDav
Strela Stealer, first identified by DCSO in late 2022, is a type of information-stealing malware primarily designed to exfiltrate email…
-
Malicious CAPTCHA delivers Lumma and Amadey Trojans
An adware campaign targets online users by presenting them with fake CAPTCHA or update prompts, tricking them into running malicious…
-
Inside the Dragon: DragonForce Ransomware Group
In this blog, Group-IB delves into the inner workings of the DragonForce ransomware group. Discovered in August 2023, DragonForce has…
-
Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN
Since early August, there has been a significant increase in Fog and Akira ransomware intrusions targeting SonicWall SSL VPN users…
-
Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN
Since early August, there has been a significant increase in Fog and Akira ransomware intrusions targeting SonicWall SSL VPN users…
-
Investigating FortiManager ZeroDay Exploitation (CVE202447575)
A new threat cluster, UNC5820, has been observed exploiting a zero-day vulnerability in FortiManager appliances across multiple industries. The vulnerability…
-
Investigating FortiManager ZeroDay Exploitation (CVE202447575)
A new threat cluster, UNC5820, has been observed exploiting a zero-day vulnerability in FortiManager appliances across multiple industries. The vulnerability…
-
Investigating FortiManager ZeroDay Exploitation (CVE202447575)
A new threat cluster, UNC5820, has been observed exploiting a zero-day vulnerability in FortiManager appliances across multiple industries. The vulnerability…
-
Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis
This analysis examines two cybersecurity incidents: a web shell attack and a VPN compromise. The web shell attack involved uploading…