Cyber Threat Intelligence perspectives on 2025
Multivariate signatures based on identification schemes
CryptoLocker is a ransomware capable of blocking documents on your computer by encrypting them with a password and making it impossible to open files, a malicious software that infects Windows...
Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....
TrickBot (or “TrickLoader”) is a banking Trojan that targets both businesses and consumers for their data, such as banking information, account credentials, personally identifiable information (PII), and even bitcoins. As...
The Emotet Trojan is one of the most dangerous malware in cybersecurity history. Individuals, companies, or even global authorities, anyone could be potential victims. Emotet tricks basic antiviruses into hiding...
Turla is one of the most advanced APTs (Advanced Persistent Threat) in the world. Also, Turla Group is a well-established collective that has been operational since at least 2004 Also...
An Evil Twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is...
WannaCry ransomware is a cryptomalware worm that attacks Windows PCs. It’s a form of malware that can spread from PC to PC across networks (hence the “worm” component) and then...
In the nowadays cybersecurity paradigm, Cyber Threat Intelligence plays a leading role. Reactive malware detection tools, firewalls, and analysis through artificial intelligence are not enough: to ensure the security of...
Rootkits have coexisted with the computer world for over 20 years, allowing hackers to access (almost) any computer. What are Rootkits? First of all, Rootkits are malware, malicious software...
FlawedGrace is the name of a Remote Access Threat (RAT) that is part of the menacing arsenal of the financially motivated cyber criminals gang known as TA505 (or Hive0065). The...