Delivering simplified cybersecurity alerts and information, ensuring you're always prepared to take immediate action.

Malware Distribution Through Trusted Microsoft Graph API Channels
Malware

Malware Distribution Through Trusted Microsoft Graph API Channels

Threat Group: Various Advanced Persistent Threats (APTs) Threat Type: Malware Distribution, Data Exfiltration, Command-and-Control (C2) Exploited Vulnerabilities: Microsoft Graph API Abuse Malware Used: Havoc, FINALDRAFT, BirdyClient, Bluelight, Graphite, Graphican, SiestaGraph Threat Score: High (8.7/10) – Exploitation of trusted Microsoft services, advanced obfuscation, widespread potential data breaches. Last Threat Observation:
3 min read
MedusaLocker Variant ETHAN Deploys Stronger Encryption and Data Theft
Ransomware

MedusaLocker Variant ETHAN Deploys Stronger Encryption and Data Theft

Threat Group: MedusaLocker Threat Type: Ransomware Exploited Vulnerabilities: No specific vulnerabilities identified; relies on common malware distribution methods Malware Used: ETHAN Ransomware (variant of MedusaLocker) Threat Score: High (9.0/10) – Due to its double-extortion tactics, data encryption capabilities, and impact on critical business operations. Last Threat Observation: March 02,
3 min read
Snake Keylogger Evolves with Advanced Obfuscation Techniques
Malware

Snake Keylogger Evolves with Advanced Obfuscation Techniques

Threat Group: Unidentified Cybercriminal Group Threat Type: Keylogger/Information Stealer Exploited Vulnerabilities: No specific vulnerabilities exploited; relies on social engineering and phishing techniques Malware Used: Snake Keylogger (New Variant) Threat Score: High (8.5/10) – Due to its advanced obfuscation techniques, persistence mechanisms, and widespread targeting Last Threat Observation: February
3 min read