Emergency Incident ResponseReport a Confirmed or Potential Breach? Call +1 770-870-6343
0 Results Found
              Back To Results
                Close
                Category: Threats & Defenses
                Threats & Defenses

                REvil: The GandCrab Connection

                Counter Threat Unit Research Team

                Technical links between the REvil and GandCrab ransomware families prove that the GandCrab malware authors did not retire in June 2019 as they claimed. Read More

                Threats & Defenses

                COBALT DICKENS Goes Back to School…Again

                Counter Threat Unit Research Team

                The COBALT DICKENS threat group persists despite law enforcement actions and public disclosures, conducting another global campaign targeting universities. Read More

                Threats & Defenses

                TrickBot Modifications Target U.S. Mobile Users

                Counter Threat Unit Research Team

                The long-running botnet added functionality to solicit PIN codes from mobile customers, which could allow threat actors to access victims’ voice and text communications. Read More

                Threats & Defenses

                Own The Router, Own The Traffic

                Counter Threat Unit Research Team

                As threat actors increasingly target supply chains, man-on-the-side techniques introduce another layer of complexity that organizations must consider. Read More

                Threats & Defenses

                State of the [BRONZE] UNION Snapshot

                Counter Threat Unit Research Team

                The BRONZE UNION threat group focuses on espionage and targets a broad range of organizations and groups using a variety of tools and methods. Read More

                Threats & Defenses

                Cloud Container Security Best Practices

                Counter Threat Unit Research Team

                Containers can reduce complexity, ensure continuity, and add layered security. However, they can also introduce risk without sufficient security controls and processes. Read More