List of Data Breaches, Malware, Vulnerabilities, Scams, and Issued Patches in July, 2019
The month of July witnessed a flurry of new malware, newly discovered vulnerabilities and attack methods used by threat actors. In addition to these, numerous large-scale data breaches . . .
Building Cyber Fusion Center the Right Way
In the ever-evolving world of cybersecurity, conventional approaches to defending an ...
Threat Intelligence ∙ Cyber Fusion Center ∙ security operations center ∙ Security Intelligence Center ∙
Triada: A Modular Mobile Trojan That Actively Uses Root Privileges To Replace System Files
Malware ProfileOrigin: 2016Alias: Android.Triada.231, Android.HiddenAds.251.originInf ...
Social Engineering ∙ Triada ∙ mobile ∙ Trojan ∙
APT40: A State-Sponsored Cyber Espionage Group Targeting North America And Europe to Obtain Advanced Naval Technology
Threat Actor ProfileOrigin: 2013Aliases: Leviathan, TEMP.Jumper, TEMP.Periscope, APT ...
TEMP.Periscope ∙ PaperRush ∙ APT40 ∙ Leviathan ∙
Honing the Art of Cyber Intelligence
Intelligence activities for defensive purposes have a long standing history in the mi ...
CFTR ∙ CTIX ∙ Cyber Threat Intelligence ∙ SOAR ∙
Indicators of Behavior: The New Powerful Approach to Detect Advanced Threats
“Know your enemy and know yourself and you can fight a hundred battles without disast ...
CFTR ∙ CTIX ∙ Indicators of Compromise (IoCs) ∙ ATT&CK ∙
Join Thousands of Other Cyware Followers!