Author: Rajas Save Introduction In recent years, the cybersecurity
landscape has witnessed the emergence of several sophisticated and
notorious ransomware groups that have wreaked havoc on organizations
worldwide. Among these malevolent actors, the L...
Author: Rajas Save Introduction The AsyncRAT malware family seems to
have been re-emerged in February 2023 delivering Windows-based
info-stealing malware payloads. The AsyncRAT malware was first active in
2016 and is known to be a remote access troja...
Author: Rajas Save Introduction On Feb 23rd, 2022, the United Kingdom's
(UK) National Cyber Security Centre (NCSC), the Cybersecurity and
Infrastructure Security Agency (CISA), the National Security Agency
(NSA), and the Federal Bureau of Investigati...
Authors: Rajas Save (@RajasSave) and Sarthak Duggal (@Sarthak)
Introduction In mid-January, reports started to surface about multiple
cyber attacks against Ukrainian government websites. Hacktivism was
spreading its wings in the form of DDoS attacks ...
A week ago, we released MITRE ATTCK® Coverage Breakdown for RSA
Netwitness Threat Content with ‘MITRE ATT&CK® Techniques – RSA
Netwitness Threat Content Mapping’ spreadsheet, which documents all
MITRE ATT&CK® Tactics and Techniques covered by RSA Net...
Greetings All, As threat actors and advisories continues to exploit
unpatched servers for Atlassian Confluence RCE exploit (CVE-2022-26134),
researchers and content creators at Netwitness has released two new
endpoint application rules in addition to...