"Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis" published by Google.
#APT37,
#CVE-2024-21338,
#CVE-2024-38178,
#Trend,
#DPRK,
#CTI https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends/?hl=en
Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis | Google Cloud Blog
This Google Threat Intelligence Group report presents an analysis of detected 2024 zero-day exploits.
Google Cloud Blog
Exclusive Threat Briefing: Inside North Korea’s Cyber Ops with Silas Cutler
Discover new insights into North Korea’s cyber ops, BeaverTail malware, and how Censys helps threat hunters move faster with real-time intel.
Censys"Threat Group Profiling: Lazarus" published by S2W.
#Lazarus,
#DPRK,
#CTI https://s2w.inc/en/resource/detail/812
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries
This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.
SentinelOne
NSFOCUS APT Monthly Briefing - March 2025 - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Regional APT Threat Situation Overview In March 2025, the global threat hunting system of NSFOCUS Fuying Laboratory discovered a total of 19 APT attack activities. These activities were mainly distributed in South Asia, East Asia, Eastern Europe, and South America, as shown in the following figure. In terms of group activity, the most active APT […]
NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks."Now that the cat is out of the bag regarding the use of front companies like BlockNovas LLC" published by TeamCymru.
#ContagiousInterview,
#DPRK,
#CTI https://archive.is/E2Hcp
Rolling in the Deep(Web): Lazarus Tsunami
The „Contagious Interview“ campaign to steal crypto currencies is still going on. We share our analysis of a comprehensive sample of the Tsunami framework used by the Lazarus group together with Yara rules and IoC to help detecting it.
HiSolutions Research"How AI services power the DPRK’s IT contracting scams" published by Okta.
#ITWorker,
#Wagemole,
#Deepfake,
#DPRK,
#CTI https://sec.okta.com/articles/2025/04/GenAIDPRK/How AI services power the DPRK’s IT contracting scams
Over the past few months, Okta Threat Intelligence conducted in-depth research into online services used by individuals identified by US authorities and trus
Okta Security
Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie
Contagious Interview (DPRK) have launched a new campaign involving three front companies that deliver BeaverTail, InvisibleFerret, and OtterCookie malware.
Silent Push
Operation SyncHole: Lazarus APT goes back to the well
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.
Kaspersky