Zephyrnet Logo

Tag: advanced persistent threat

Cisco Warns of Massive Surge in Password Spraying Attacks on VPNs

Cisco Talos this week warned of a massive increase in brute-force attacks targeting VPN services, SSH services, and Web application authentication interfaces.In its advisory,...

Top News

Vulnerabilities in business VPNs under the spotlight

Virtual Private Network (VPN) services have emerged as essential tools for modern businesses in recent years, doubly so since helping save the day for...

Russian Advanced Persistent Threat Group ‘Winter Vivern’ Focuses on European Governments and Military

Russian Advanced Persistent Threat Group 'Winter Vivern' Focuses on European Governments and Military In recent years, cybersecurity threats have become a growing concern for governments...

Russian APT Turla Wields Novel Backdoor Malware Against Polish NGOs

Russia-sponsored advanced persistent threat group (APT) Turla is now targeting Polish NGOs in a cyberespionage campaign that uses a freshly developed backdoor with modular...

Russian Advanced Persistent Threat Group Turla Utilizes New Backdoor Malware to Target Polish Non-Governmental Organizations (NGOs)

Russian Advanced Persistent Threat Group Turla Utilizes New Backdoor Malware to Target Polish Non-Governmental Organizations (NGOs) In recent years, cybersecurity threats have become increasingly sophisticated...

China’s Cyberattackers Maneuver to Disrupt US Critical Infrastructure

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a report detailing how the China-backed Volt Typhoon advanced persistent threat (APT) is consistently...

Ivanti Zero-Day Patches Delayed as ‘KrustyLoader’ Attacks Mount

Attackers are using a pair of critical zero-day vulnerabilities in Ivanti VPNs to deploy a Rust-based set of backdoors, which in turn download a...

New RemcosRAT Campaign Utilizes Uncommon Data Transfer Tactic, Linked to Threat Group

New RemcosRAT Campaign Utilizes Uncommon Data Transfer Tactic, Linked to Threat Group In the ever-evolving landscape of cyber threats, a new campaign utilizing an uncommon...

Inside the Mind of a Cyber Attacker! – Supply Chain Game Changer™

In the perpetual game of cat and mouse between cyber attackers and defenders, the battleground is vast and dynamic. Understanding the Tactics, Techniques, and...

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...

Volt Typhoon-Linked SOHO Botnet Infects Multiple US Gov’t Entities

Researchers have discovered an Internet of Things (IoT) botnet linked with attacks against multiple US government and communications organizations.The "KV-Botnet," revealed in a report...

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan

ESET researchers have identified what appears to be a watering-hole attack on a regional news website that delivers news about Gilgit-Baltistan, a disputed region...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?