Author name: Cymon

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition covers a cryptocurrency exchange website attack, the analysis of sophisticated adware named HotPage, and how cybercriminal forums facilitate the lifecycle of CVEs to ransomware attacks. 1. Cryptocurrency exchange website attacked Full report […]

Weekly Cyber Threat Intelligence Summary Read More »

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle

By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22 minutes to weaponise a publicly available Proof-of-Concept (PoC) exploit following its release. The IT services management company noted an increase in scanning for disclosed Common and in attempts to weaponise available PoCs across 2023 and 2024. During the

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle Read More »

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition covers a supply-chain attack conducted using Trojanized jQuery, the sale of fake Olympic Games tickets, and a phishing campaign targeting banking users in India. 1. TransparentTribe targets the gaming industry with spyware

Weekly Cyber Threat Intelligence Summary Read More »

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition covers alleged access to high-revenue organisations advertised by IntelBroker, TransparentTribe targeting the gaming industry with spyware, and an analysis of the FakeBat loader. 1. IntelBroker advertises alleged access to high-revenue organisations Full

Weekly Cyber Threat Intelligence Summary Read More »

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition covers zero-day exploits advertised on a cybercriminal forum, a new AI threat taxonomy from Google DeepMind, and a newly identified side-channel attack method called SnailLoad.  1. Zero-day exploits advertised Full report available

Weekly Cyber Threat Intelligence Summary Read More »

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition analyses cyberattacks related to a new malware campaign targeting Docker APIs, a Phishing-as-a-Service platform attacking Microsoft 365, and an analysis of the cyberespionage group UNC3886. 1. Exposed Docker APIs targeted by crypto-mining

Weekly Cyber Threat Intelligence Summary Read More »

The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23

Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of the Cyjax Geopolitical and Cybersecurity Podcast. Here’s a summary of what’s on the table… The Geopolitical Cyber and Security Implications of the Upcoming British Election As the UK gears up for its next general election, the landscape

The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Read More »

Scroll to Top