DeathStalker – Possible ‘For-Hire’ Mercenary APT
DeathStalker is an APT with activities dating back to at least 2018 and possibly as far back as 2012. They exist as an anomaly in... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
DeathStalker is an APT with activities dating back to at least 2018 and possibly as far back as 2012. They exist as an anomaly in... Read More
Transparent tribe, also known as PROJECTM and MYTHIC LEOPARD, is an APT who has been known to be active since 2013 and often target the... Read More
CVE-2020-13699 is a high-risk vulnerability that could be exploited by remote attackers to steal system passwords and potentially compromise it, and affects the popular TeamViewer... Read More
Guardicore Labs has discovered a new botnet campaign as part of their ongoing Botnet Encyclopedia research, named ‘FritzFrog.’ First discovered January 9th, 2020, FritzFrog is... Read More
The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165 is the center of a new FBI cybersecurity... Read More
Since March 2020, an ongoing series of business email compromise campaigns have been targeting business executives across the world. Threat actors dubbed “Water Nue” have... Read More
Operation PowerFall – Threat Actor Leverages Internet Explorer and Windows 10 Zero-Days In May of 2020, Kaspersky Technologies prevented an attack on a South... Read More
Malwarebytes continued research into credit card skimming has led them to an attack known as homoglyph attack. The fundamentals of the attack are where characters... Read More
Researcher Dr. Neal Krawetz has published details regarding multiple zero-day exploits for the popular Tor network and Tor browser. In blog posts last week, Dr.... Read More
GuLoader is a downloader made by Cloud Eye, an Italian firm, that is used by threat actors for the purpose of distributing malware. CloudEye was... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..