REPORT

DATE

NAME

CATEGORY

SUBCATE

INFO

17.6.24 Unfading Sea Haze REPORT REPORT Deep Dive into the Unfading Sea Haze A technical look at a threat actor’s ever-evolving tools and tactics

7.6.24

Ransomware Trends 2024

REPORT

REPORT

Veeam’s goal is to relentlessly advance data and cyber resilience to keep your business running.

31.5.24

AI and Covert Influence Operations:
Latest Trends
REPORT AI OpenAI is committed to enforcing policies that prevent abuse and to improving transparency around AI-generated content.
30.4.24 MUDDLING MEERKAT:
THE GREAT FIREWALL
MANIPULATOR
REPORT REPORT THE GREAT FIREWALL MANIPULATOR
17.4.24 Connect:fun REPORT REPORT Detailing an exploitation campaign targeting FortiClient EMS via CVE-2023-48788
5.3.24 BEWARE THE SHALLOW
WATERS: SAVVY
SEAHORSE LURES VICTIMS
TO FAKE INVESTMENT
PLATFORMS THROUGH
FACEBOOK ADS
REPORT REPORT DNS threat actors never cease to surprise us. Every day, we learn about creative, new campaigns they have devised to exploit victims. Investment scams are one of these. The US Federal Trade Commission reported that more money was lost to investment scams in the US during 2023 than any other type of scam, totaling over USD $4.6 billion dollars stolen from victims
4.3.24 ShadowBankinginYour Pocket:ExposingAndroidApp UsedbyMoneyMules REPORT REPORT A money mule refers to an individual enlisted to receive and transfer funds acquired through fraudulent activities. This role is pivotal in the execution of various financial crimes, such as cyber fraud or money laundering. Importantly, the involvement of money mules introduces an additional layer of complexity, making it challenging for law enforcement to trace the origins of illicit transactions.

28.2.24

Russian Cyber Actors Use Compromised Routers to
Facilitate Cyber Operation
REPORT REPORT Actions EdgeRouter network defenders and users should implement to protect against APT28 activity
21.2.24 Tool of First Resort REPORT REPORT Israel-Hamas War in Cyber
1.2.24 2023 Adversary Infrastructure Report REPORT Report 2023 Adversary Infrastructure Report