Cosmic Lynx – The Rise of a Russian BEC Group
In a recent white paper published by Agari Cyber Intelligence Division (ACID), great insight is given into a threat actor that leverages social engineering attacks... Read More
Cyber threats refer to the actors and actions attempting to execute successful cyber attacks aimed at gaining unauthorized access, damaging, disrupting, or stealing information technology assets, computer networks, intellectual property, personally identifiable information, or any other form of sensitive data. Cyber threats can originate from within an organization by trusted users or from outside the organization by external malicious actors. This page provides information on some of the cyber threats that Atlas Cybersecurity is tracking.
In a recent white paper published by Agari Cyber Intelligence Division (ACID), great insight is given into a threat actor that leverages social engineering attacks... Read More
A new zero-day vulnerability has been found to exist within 79 Netgear router models that allows an attacker to gain full control, remotely, over the... Read More
The ‘Joker’ malware, first discovered in 2017, has once again found its way onto the Google Play Store, Google’ official Android app store. Originally designed... Read More
Telia, a Swedish multinational telecommunications company, provides mobile service, FTTH internet, DSL internet and IPTV. They are also known for renting and selling custom routers... Read More
In March of 2020, Morphisec Labs had tracked an obfuscated VBScript package being used in active threat actor campaigns. Originally, the VBScript was a trojan... Read More
Apache Guacamole, a popular open-source, clientless remote desktop gateway that supports protocols like VNC, RDP, and SSH, has been recently found to have multiple critical... Read More
In April of 2020, Trustwave SpiderLabs’ Threat Fusion Team performed a ‘Proactive Threat Hunt’ for a global technology vendor with significant business in the US,... Read More
Malwarebytes Labs recently found credit card skimming code hidden with the metadata of an image file, a process known as ‘steganography.’ This image file would... Read More
Pillowmint malware is a point-of-sale trojan targeting Track 1 and Track 2 credit card data. Over the past few years threat actors named FIN7, also... Read More
Evil Corp, despite being a fictional organization within the award-winning show, Mr. Robot, is known in our world as one of the most dangerous and... Read More
58% of Malware Attack Victims
Are Categorized As Small Businesses..