This Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber threat to cryptocurrency...
Learning & Resource Center
Most Popular Posts
Vulnerabilities in Google Android OS Could Allow for RCE
OVERVIEW: Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to,...
CVE-2021-36934 – HiveNightmare
Summary The default configuration in Microsoft Windows 10 v1809 and newer includes an elevation of privilege vulnerability, because of overly permissive Access Control Lists (ACLs) in the Security Accounts Manager (SAM) database, as well as multiple other system...
CVE-2021-1675 and CVE-2021-34527 – PrintNightmare
Fortify 24x7 is tracking various public weaponized exploits for a remote code execution vulnerability affecting the Windows Print Spooler service (spoolsv.exe): CVE-2021-1675 and an out of band patch for CVE-2021-34527, also known as PrintNightmare. The vulnerability...
The Importance of SOC Analysts
In today's digital landscape, cyber threats are constantly evolving and becoming more sophisticated. As a result, organizations are increasingly relying on security operations center (SOC) analysts to protect their networks and data from cyber attacks. In this...
The Role of SOC Analysts
In today's digital landscape, cyber threats are becoming increasingly sophisticated and prevalent. As a result, organizations are investing in security operations centers (SOCs) to protect their networks and data. Within these SOCs, SOC analysts play a crucial role in...
Challenges Faced by Security Operations Teams
In today’s digital landscape, security operations teams are facing more challenges than ever before. With the rise of cyber threats and the increasing complexity of networks and systems, security operations teams are under immense pressure to protect their...
Enhancing Cybersecurity Through Strategic Operations
In today’s digital age, cybersecurity is a top priority for businesses of all sizes. With the rise of cyber attacks and data breaches, companies must take proactive measures to protect their sensitive information and maintain the trust of their customers. One crucial...
The Role of Automation in Security Operations
In today’s digital landscape, security operations are more critical than ever. With the rise of cyber threats and data breaches, companies must have robust security measures in place to protect their sensitive information and maintain the trust of their customers. One...
Advisories
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Research & Situational Awareness
BlackCat/ALPHV Ransomware IOCs
As of March 2022, BlackCat/ALPHV ransomware as a service (RaaS) had compromised at least 60 entities worldwide and is the first ransomware group to do so successfully using RUST, considered to be a more secure programming language that offers improved performance and...
IOCs Associated with Ranzy Locker Ransomware
The FBI first identified Ranzy Locker ransomware in late 2020 when the variant began to target victims in the United States. Unknown cyber criminals using Ranzy Locker ransomware had compromised more than 30 US businesses as of July 2021. The victims include the...
Company News
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.