Topic: attack detection
-
Noisy Ransomware Uncovered a Long-Term Espionage Operation
A ransomware group's disruptive attack on two Russian companies inadvertently exposed a long-running, sophisticated cyber espionage operation, highlighting how a visible breach can mask a more insidious threat. The espionage group, QuietCrabs, used a stealthy multi-stage attack with unique malwar...
Read More » -
How Hackers Weaponize Legitimate Tools for Cyberattacks
Threat actors increasingly use legitimate organizational tools through Living-off-the-Land (LotL) techniques, with 84% of modern cyberattacks exploiting trusted applications to bypass traditional defenses and evade detection. Attackers initiate breaches via social engineering, such as malicious V...
Read More » -
Linux Kernel Runtime Guard 1.0.0 Released: Major Updates & Expanded Support
LKRG 1.0.0 has been released after over seven years of development, offering real-time monitoring of the Linux kernel to detect tampering and exploitation without kernel modifications. This version enhances stability, performance, and compatibility, supporting kernels up to 6.17-rc4 and improving...
Read More » -
Ransomware Payouts Hit Record $3.6M as Attacks Evolve
The average ransom payment surged 44% to a record $3.6 million, even as the number of ransomware incidents decreased, indicating a shift toward more targeted attacks. Despite fewer attacks, 70% of victimized organizations paid ransoms, with critical sectors like healthcare and government facing a...
Read More »