-
ZDI Threat Hunting 2024: Highlights, Trends, & Challenges
Reflecting on 2024, it has been an eventful year for the Zero Day Initiative Threat Hunting team. Throughout the year, we identified numerous threat actor campaigns exploiting zero-day vulnerabilities, uncovered additional variants of these vulnerabilities, and discovered even more vulnerabilities through our in-the-wild research. In this blog, we will highlight some of the key achievements…
-
Russian internet provider confirms its network was ‘destroyed’ following attack claimed by Ukrainian hackers
In a statement on the Russian social media platform VKontakte, the St. Petersburg-based company said the “planned” attack “destroyed” its infrastructure overnight. Nodex added that it was working to restore systems from backups but could not provide a timeline for when operations would fully resume. Go to Source
-
What is phishing?
During phishing, a target or targets are approached by email, telephone, or text message by someone posing as a legitimate institution. This is done to lure individuals into providing sensitive data such as passwords, banking and credit card details, and personally identifiable information. The information is then used to access sensitive accounts, resulting in identity…
-
Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
A ZLoader malware campaign is exploiting a nine-year-old flaw in Microsoft’s digital signature verification to steal credentials and sensitive information using remote monitoring tools. According to Check Point Research, which has been tracking the sophisticated infection chain since November 2021, it has been attributed to a cybercriminal group dubbed MalSmoke, citing similarities with previous attacks.…