
Blog
-
Apache Under the Lens: Tomcats Partial PUT and Camels Header Hijack
In March 2025, Apache disclosed three critical vulnerabilities: CVE-2025-24813 in Apache Tomcat and CVE-2025-27636 and CVE-2025-29891 in Apache Camel. These…
-
DCRAT Impersonating the Colombian Government
A new email attack distributing DCRAT, a Remote Access Trojan, has been uncovered. The threat actor impersonates a Colombian government…
-
Windows Shortcut (LNK) Malware Strategies
This article provides an in-depth analysis of Windows shortcut (LNK) file malware, based on the examination of 30,000 recent samples.…
-
10 Things I Hate About Attribution: RomCom vs. TransferLoader
This report analyzes the activities of two threat actor clusters: TA829 and UNK_GreenSec. TA829 conducts both espionage and cybercrime operations…
-
10 Things I Hate About Attribution: RomCom vs. TransferLoader
This report analyzes the activities of two threat actor clusters: TA829 and UNK_GreenSec. TA829 conducts both espionage and cybercrime operations…
-
Hide Your RDP: Password Spray Leads to RansomHub Deployment
This report details a cyberattack where threat actors gained initial access through a password spray attack on an exposed RDP…
-
Hide Your RDP: Password Spray Leads to RansomHub Deployment
This report details a cyberattack where threat actors gained initial access through a password spray attack on an exposed RDP…
-
Hide Your RDP: Password Spray Leads to RansomHub Deployment
This report details a cyberattack where threat actors gained initial access through a password spray attack on an exposed RDP…
-
Snake Keylogger in Geopolitical Affairs: Abuse of Trusted Java Utilities in Cybercrime Operations
The S2 Group’s intelligence team has identified through adversary tracking a new phishing campaign by Snake Keylogger, a Russian origin…
-
Introducing the Cybereason TTP Briefing: Frontline Threat Intelligence Insights
Introducing the Cybereason TTP Briefing: Frontline Threat Intelligence Insights===============================================================================Written ByCybereason Consulting Team Gain insight into the latest attack trends, techniques,…

