Bellingcat Story – Creating Impact: A Year On Stop Child Abuse — Trace An Object
In the digital age, the fight against child abuse has taken on new dimensions. One of the most innovative approaches to this issue is the “Stop Child Abuse – Trace…
In the digital age, the fight against child abuse has taken on new dimensions. One of the most innovative approaches to this issue is the “Stop Child Abuse – Trace…
The UK Further and Higher Education sectors are increasingly becoming targets for cyber-attacks. These attacks range from opportunistic ransomware operations to more sophisticated Advanced Persistent Threat (APT) groups. This report…
Online and at conferences, people ask me how to get started in threat intel. What I usually offer as advice to budding analysts starting out is to practise analysing things…
The Evasive Panda Advanced Persistent Threat (APT) group, also known as BRONZE HIGHLAND and Daggerfly, has been active since at least 2012. This Chinese-speaking APT group has been conducting cyberespionage…
Insider threats are a significant cybersecurity risk that originates from within an organisation. These threats can come from current or former employees, contractors, or anyone else with intimate knowledge of…
In a recent blog post by Mandiant, a cybersecurity firm, they highlighted the potential risks associated with third-party Windows installers. The post emphasizes how threat actors can exploit these installers…
In the ever-evolving landscape of cyber threats, the UAC-0006 threat actor group has recently resurfaced with a new wave of attacks. This time, they're deploying the SmokeLoader malware through a…
In a recent report, the Computer Emergency Response Team of Ukraine (CERT-UA) has highlighted a significant increase in cyberattacks against the country’s civil infrastructure websites, particularly those of government agencies…
MITRE Engenuity's Centre for Threat-Informed Defence has developed a new open-source platform, the Threat Report ATT&CK Mapper (TRAM). TRAM is designed to advance research into automating the mapping of cyber…
The notorious APT41 hacking group, known for their extensive cyber-espionage operations, has turned their attention to Android devices, deploying two newly discovered spyware strains, WyrmSpy and DragonEgg. These strains, discovered…