Recently it has been observed that Morphisec Labs has witnessed a new wave of JSSLoader infections this year.
Since 2020, supply chain attacks have grown exponentially, and innovative mitigation solutions are urgently required.
Since 2017, the attacker has flung simple off-the-shelf malware in malicious email campaigns aimed at aviation, aerospace, transportation and defense.
Researchers have identified an advanced persistent threat (APT) group responsible for a series of cyberespionage and spyware attacks against the aviation, aerospace, transportation and defense industries since at least 2017 that feature high-volume email campaigns using industry-specific lures.
For years, a low-skilled attacker has been using off-the-shelf malware in malicious campaigns aimed at companies in the aviation sector as well as in other sensitive industries. The threat actor has been active since at least 2017, targeting entities in the aviation, aerospace, transportation, manufacturing, and defense industries.
Tracked using the codename of TA2541, the group has been one of the most persistent threats in recent years, even if their attacks have been largely unsophisticated and have relied on infecting and deploying commodity malware on targets’ networks.
With examples changing hands for up to $69 million, hosting digital content on blockchain and selling it to investors has become one of the most lucrative things creators can do. And as rock stars, international artists, and even politicians keep “minting” non-fungible tokens (NFTs) and investors keep rushing in to buy them, the NFT space has undergone exponential growth.
Endpoint protection or endpoint detection and response (EDR) security solutions collect and analyze threat data from endpoints connected to a network to facilitate real-time identification of malicious events like breaches and attacks. Also, EDR helps companies continuously monitor endpoint devices and respond to detected cyber threats as they occur. Typically, an EDR solution has four primary functions—monitor endpoints, collect threat data, apply data analytics to see threat patterns, deploy automatic responses to mitigate identified threats, and forensics analysis to investigate incidents further.
Identity Detection and Response (IDR) is a new enterprise cybersecurity method
The operators of the SolarMarker information stealer and backdoor have been discovered using subtle ways to create long-term persistence on compromised computers, indicating that threat actors are constantly changing tactics and updating their defensive mechanisms.
Experienced Marketing Leader Joins Cybersecurity Vendor to Drive Market Share and Brand Awareness BE’ER SHEVA, ISRAEL AND ...
VP of Product at Morphisec recognized at the prestigious Black Unicorn Awards BE’ER SHEVA, ISRAEL & BOSTON --AUGUST 02, ...
Morphisec CTO & Head of Threat Research recognized at the prestigious Black Unicorn Awards BE’ER SHEVA, ISRAEL, AND BOSTON ...