Delivering simplified cybersecurity alerts and information, ensuring you're always prepared to take immediate action.

Docker Security Alert as TeamTNT Deploys Rootkits and Cryptominers
Malware

Docker Security Alert as TeamTNT Deploys Rootkits and Cryptominers

Threat Group: TeamTNT Threat Type: Cryptojacking, Cloud Container Exploitation Exploited Vulnerabilities: Misconfigured Docker APIs, SSH vulnerabilities in cloud environments Malware Used: Custom cryptomining scripts, Tsunami malware, Diamorphine rootkit Threat Score: Critical (9/10) — due to sophisticated, automated methods targeting widespread containerized and cloud infrastructures Last Threat Observation: October 2024, by
2 min read
SocGholish and FakeUpdate Evolved Threats in Browser-Based Attacks
Malware

SocGholish and FakeUpdate Evolved Threats in Browser-Based Attacks

Threat Group: TA569 (SocGholish operators) Threat Type: Malware Delivery via Fake Update Alerts Exploited Vulnerabilities: Compromised websites with JavaScript injection Malware Used: SocGholish (FakeUpdate), NetSupport RAT, Raspberry Robin Worm Threat Score: High (8.5/10) — Effective social engineering with broad targeting and advanced persistence techniques Last Threat Observation: October 2024
4 min read
Akira Ransomware Adapts Its Tactics to Exploit Major Vulnerabilities in 2024
Ransomware

Akira Ransomware Adapts Its Tactics to Exploit Major Vulnerabilities in 2024

Threat Group: Akira Ransomware Threat Type: Ransomware Exploited Vulnerabilities: , CVE-2024-40766 (SonicWall), CVE-2020-3259 (Cisco), CVE-2023-20263 (Cisco), CVE-2023-20269 (Cisco), CVE-2023-27532 (Veeam), CVE-2023-48788 (Ubuntu), CVE-2024-37085 (SAP), CVE-2024-40711 (Microsoft) Malware Used: Akira, Megazord Threat Score: 8.5/10 Last Threat Observation: October 22, 2024 (Resurfaced) Overview Akira ransomware has resurfaced with advanced capabilities, exploiting
2 min read
Dual Threat Crystal Rans0m Combines Ransomware and Infostealing Capabilities
Ransomware

Dual Threat Crystal Rans0m Combines Ransomware and Infostealing Capabilities

Threat Group: Unattributed Threat Type: Hybrid ransomware with stealer capabilities Exploited Vulnerabilities: Outdated software, phishing, P2P downloads Malware Used: Crystal Rans0m (Rust-based) Threat Score: High (8.5/10) — Due to the combination of file encryption, information theft, modular structure, and anti-VM techniques. Last Threat Observation: October 21, 2024 Overview Crystal
2 min read