How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry Gain...
Category: Attack
Sep 26, 2023THNCyber Espionage / Malware A "multi-year" Chinese state-sponsored cyber espionage campaign has been observed targeting South Kor...
Sep 26, 2023THNVulnerability / Source Code A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous d...
Sep 25, 2023The Hacker NewsPassword Security / Cybersecurity Weak password policies leave organizations vulnerable to attacks. But are the sta...
Sep 25, 2023THNCyber Attack / Phishing Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures...
Sep 25, 2023The Hacker NewsArtificial Intelligence / Cybersecurity Generative AI is a double-edged sword, if there ever was one. There is broa...
Sep 25, 2023THNSpyware / Cyber Espionage Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign...
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the regio...
Sep 23, 2023THNCyber Espionage / Malware Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyp...
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a ...