Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign
Sfruttamento vulnerabilità

CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign

In addition to our Water Hydra APT zero day analysis, the Zero Day Initiative (ZDI) observed a DarkGate campaign which we discovered in mid-January 2024 where DarkGate operators exploited CVE-2024-21412.

March 13, 2024
Minacce cyber

Importance of Scanning Files on Uploader Applications

Delve into the crucial practice of file scanning within uploader applications, and learn defensive measures to safeguards against malicious threats like malware.

Expert Perspective Apr 12, 2024

Save to Folio

Expert Perspective Apr 12, 2024

Save to Folio

APT & attacchi mirati

How Red Team Exercises Increases Your Cyber Health

Delve into the world of red team exercises, their vital role in enhancing organizational security through simulated cyberattacks, including tactics like phishing and lateral movement within networks, and understand the need for regular testing and improvement to counter evolving threats effectively.

Security Strategies Apr 11, 2024

Save to Folio

Security Strategies Apr 11, 2024

Save to Folio

Minacce cyber

Fileless Attacks Prompt Intel’s Next-Gen Security

Discover how Trend is strengthening its endpoint solutions to detect fileless attacks earlier. By leveraging Intel Threat Detection Technology, Trend enhances the scalability and resiliency of its solutions.

Security Strategies Apr 11, 2024

Save to Folio

Security Strategies Apr 11, 2024

Save to Folio

Cloud

Why a Cloud Security Platform Approach is Critical

Explore how a cybersecurity platform with attack surface management and runtime protection capabilities can enhance your cloud security posture.

Security Strategies Apr 03, 2024

Save to Folio

Security Strategies Apr 03, 2024

Save to Folio

APT & attacchi mirati

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs

This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON.

Research Apr 02, 2024

Save to Folio

Research Apr 02, 2024

Save to Folio

Conformità e rischi

NIST Launches Cybersecurity Framework (CSF) 2.0

On February 26, 2024, the National Institute of Standards and Technology (NIST) released the official 2.0 version of the Cyber Security Framework (CSF).

Expert Perspective Mar 20, 2024

Save to Folio

Expert Perspective Mar 20, 2024

Save to Folio