Security Dive
New articles!
Distributed Denial of 2023?
Domain Spoofing
Writeup Drive Hackthebox
Articles
The escalation of invasive wiretapping in Cyber Warfare
Key Takeaways Wiretapping, previously associated primarily with spy cinema, has become a real and evolving threat in today's digital world, with state actors and APT groups…
Insider Threat – What if the Big Bad Wolf was already in?
Insider threat is considered as one of the top-10 concerns in cyberspace in 2023. It is as prominent cause of…
Snake Malware
Taken down by the FBI after 20 years of existence Key Takeaways In a coordinated operation FBI with other organizations took down the Snake malware operational infrastructure. Snake malware has been linked with the…
Cl0p Ransomware Group activity related to data leaks from GoAnywhere MFT
The essentials The Threat Actor TA505 is deemed as a trendsetter for its ever-changing tactics, techniques, and procedures (TTPs) It targets…
Deepfake and PII - an Inside Threat concept supported by Artificial Intelligence
Executive Summary Deepfake is a photo manipulation technology that has been developed in an open-source model since 2018…
New DDoS threats on the rise for emergency calling services
Emergency calling services need to offer a 24/7 availability to the citizens. Unfortunately this is not always true due to new cyber threats…
Risks from the Cyberattacks in the RU-UA conflict
Risks from the Cyberattacks in the RU-UA conflict Executive Summary With the ongoing conflict between Russia and Ukraine escalating, the risk remains high for…
Surge in malware loaders activity, a dangerous trend before the Christmas Holidays
Surge in malware loaders activity A dangerous trend before the Christmas Holidays The Christmas Holidays are almost upon as. We…
Log4Shell - Unauthenticated RCE 0-day exploit
Log4Shell – Unauthenticated RCE 0-day exploit (CVE-2021-44228) In this blog, we provide background on Log4Shell vulnerability (CVE-2021-44228), detection guidance and we recommend mitigations. Vulnerability
External remote services attacks
External remote services attacks How to stop one of today’s most common intrusion methods? Cybersecurity incidents are on the rise. 64% of companies have suffered at least one incident. Ransomware grew by…
BlackMatter ransomware
Introduction Atos Digital Security regularly performs incident response and gathers information on various groups of attackers. Among them, BlackMatter stands out for its remarkably rapid rise despite its recent inception. This new group of attackers…
Cloud attacks: How to secure a growing threat vector
Cloud attacks: How to secure a growing threat vector The cloud is a double-edged sword. On the one hand, organizations have used the…
Vertical specialized attacks- industry
Vertical-specialized attacks: how to stay safe when your industry is under attack Cybersecurity has always been complex. These unique security challenges come from many places — your products, your digital…
Discovering Potentially Abusable Binaries with streamlined PE Import Table searching
Introduction I decided to put this blog post together only to share a simple idea which could potentially be useful or inspirational to…
Phishing campaign using HTML Smuggling to get your Office365 credentials
Threat Actors constantly evolve in their campaigns to be more successful as security tools are getting better and well-trained employees are more vigilant…
Avaddon Ransomware Analysis
Atos Digital Security regularly performs incident response and gather information on various attacker groups. Among them, Avaddon stands out for its modus operandi and its rise.