Threat Intelligence
Attacker ID’ed After Infecting Own Computer With Malware
A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
An ‘Alarming Escalation’ of Sophistication in DDoS Attacks, Cloudflare Says
Distributed DDoS attacks are becoming increasingly sophisticated and complex, making an already-expanding threat landscape even more challenging ...
Biden Admin. Adds ‘Mercenary Spyware’ Firms to Ban List
European cousins Intellexa and Cytrox essentially banned by Commerce Dept. — Predator/ALIEN not welcome in U.S ...
ChatGPT Provides Limited Help Identifying Malware
Current LLM-based tech like ChatGPT can accurately classify malware risk in only 5% of cases—and they may never be able to recognize novel approaches used to create malware ...
Russia Expected to Increase Critical Infrastructure Attacks
Russia’s war strategy increasingly involves cybersecurity, with the country expected to ramp up attacks on critical infrastructure in Ukraine and countries that are members of NATO, according to Switzerland’s Federal Intelligence Service ...
CISA to Gov’t Agencies: Mitigate a Flaw in Windows and Office
The U.S. government is giving federal agencies three weeks to mitigate a zero-day Microsoft Windows and Office security flaw exploited by the Russian-linked RomCom threat group ...
A Look at the Email Threat Landscape in Q1 2023
VIPRE's Email Threat Trends Report for Q1 2023 analyzed 1.8 billion emails to provide a comprehensive understanding of contemporary email threats ...
The Two Faces of AI in Identity Management
The advent of AI made identity the most-targeted part of the attack surface. But without AI, identity is a sitting duck ...
APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware
Red Menshen is an APT group that is rapidly evolving its BPFDoor backdoor malware that targets systems running Linux or Solaris ...
OPSEC FAIL: US Military Email Going to Mali — via Typo
MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in .ML ...