A temporary workaround is available while a patch is in development:
www.huntress.com/blog/gladine...
A temporary workaround is available while a patch is in development:
www.huntress.com/blog/gladine...
www.huntress.com/blog/nezha-c...
www.huntress.com/blog/nezha-c...
Deepfake Zoom calls. AppleScript lures. Rosetta 2 abuse.
Plenty of custom malware: Nim backdoor, Go infostealer, Obj-C keylogger, and more!
Amazing write-up by @re.wtf , @stuartjash.bsky.social and Jonathan Semon 🔥
🔗 www.huntress.com/blog/inside-...
Deepfake Zoom calls. AppleScript lures. Rosetta 2 abuse.
Plenty of custom malware: Nim backdoor, Go infostealer, Obj-C keylogger, and more!
Amazing write-up by @re.wtf , @stuartjash.bsky.social and Jonathan Semon 🔥
🔗 www.huntress.com/blog/inside-...
We see an attacker failing to log in across a number of environments and then eventually succeeding in 1 organization.
Stopping attacks at initial access ❤️
We see an attacker failing to log in across a number of environments and then eventually succeeding in 1 organization.
Stopping attacks at initial access ❤️
Fake Zoom Ends in BlackSuit Ransomware
Analysis and reporting completed by @pigerlin, UC1 and @Miixxedup
Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/03/31/f...
Fake Zoom Ends in BlackSuit Ransomware
Analysis and reporting completed by @pigerlin, UC1 and @Miixxedup
Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/03/31/f...
Come listen to @antonlovesdnb.bsky.social and Dray Agha discuss tradecraft we're seeing in the wild.
Come listen to @antonlovesdnb.bsky.social and Dray Agha discuss tradecraft we're seeing in the wild.
Heck these days, lots of VPN and Firewall products are the direct source of business ending intrusions.
Heck these days, lots of VPN and Firewall products are the direct source of business ending intrusions.
The Threat Actor Profile Guide for CTI Analysts (curatedintel.org)
The Threat Actor Profile Guide for CTI Analysts (curatedintel.org)
Interested in Adversary in the Middle attacks? www.huntress.com/blog/unmaski...
Interested in Adversary in the Middle attacks? www.huntress.com/blog/unmaski...
For the past 6 months, Huntress has been investigating OAuth abuse – and what we found is terrifying. 🧵👇
www.huntress.com/blog/never-j...
For the past 6 months, Huntress has been investigating OAuth abuse – and what we found is terrifying. 🧵👇
www.huntress.com/blog/never-j...