SocGholish finds success through novel email techniques

Portal Nachrichten

Team IT Sicherheit NEWS (572 Quellen): 30.11.22 Fixes Designänderung und Störung behoben.


Nachrichtenthemen Chronologie


➤ Ähnliche Beiträge für 'SocGholish finds success through novel email techniques'

AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

vom 1093.11 Punkte
Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework.

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

vom 646.96 Punkte
Original release date: February 17, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result o

AA22-083A: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector

vom 564.95 Punkte
Original release date: March 24, 2022SummaryActions to Take Today to Protect Energy Sector Networks: • Implement and ensure robust network segmentation between IT and ICS networks. • Enforce MFA to authenticate to a system. • Manage the creation

AA20-239A: FASTCash 2.0: North Korea&#039;s BeagleBoyz Robbing Banks

vom 547.44 Punkte
Original release date: August 26, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This joint advisory is

AA21-076A: TrickBot Malware

vom 391.83 Punkte
Original release date: March 17, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructur

AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities

vom 354.25 Punkte
Original release date: September 15, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was writte

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

vom 348.72 Punkte
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity

AA20-280A: Emotet Malware

vom 344.94 Punkte
Original release date: October 6, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was writte

AA22-277A: Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization

vom 316.88 Punkte
Original release date: October 4, 2022SummaryActions to Help Protect Against Russian State-Sponsored Malicious Cyber Activity: • Enforce multifactor authentication (MFA) on all user accounts. • Implement network segmentation to separate network s

AA20-275A: Potential for China Cyber Response to Heightened U.S.–China Tensions

vom 282.04 Punkte
Original release date: October 1, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. In light of heightened

AA22-320A: Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

vom 271.83 Punkte
Original release date: November 16, 2022SummaryFrom mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) ac

AA22-152A: Karakurt Data Extortion Group

vom 263.57 Punkte
Original release date: June 1, 2022 | Last revised: June 2, 2022SummaryActions to take today to mitigate cyber threats from ransomware: • Prioritize patching known exploited vulnerabilities. • Train users to recognize and report phishing attempts.

Team Security Diskussion über SocGholish finds success through novel email techniques