-
DarkGate: Opening Gates for Financially Motivated Threat Actors
-
The Rapidly Evolving Landscape of Generative AI Tools, AI-Powered Cyber Threats and AI-Centric Adversarial Tactics
-
ChatGPT Vulnerability; LockBit Cyberattack On ICBC; US Water Authority Hacked
-
Navigating Cyber Challenges: Biden's AI Executive Order, Ransomware Attack on German Municipalities
-
Cisco IOS XE Web UI Privilege Escalation Vulnerability; Sandworm Targets Ukrainian Telecom
-
Johnson Controls Ransomware Attack; McLaren Health Care Data Breach; Unpatched Exim Vulnerability; Lazarus LinkedIn Attack; NATO Cyber Breach
-
Ransomware and DDoS Feature in The Apex of Crime-as-a-Service Report
-
Decrypting Key Group Ransomware: Emerging Financially Motivated Cyber Crime Gang
-
Flax Typhoon targeting Taiwan, Ransomware Emphasizing Linux-Centric Payloads
-
FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware
-
Creative Ransomware Extortion; Further Malware Capabilities With ChatGPT
-
Polish Healthcare Industry Targeted by Vidar Infostealer Likely Linked to Djvu Ransomware
-
3CX Incident Attributed to North Korea; New LockBit MacOS Sample
-
CISA Warns of Telerik Vulnerability; Kimsuky Steal Gmail Emails
-
ESXi Ransomware Updates Counter Recovery Script; Killnet Targets Airports and Hospitals
-
2023: Complexity Reigns in Cybersecurity as Existing Threats Adapt and New Technologies Emerge
-
Changes in Retail and Hospitality Cyber Threat Trends During the 2020 and 2021 Holiday Seasons
-
EclecticIQ Retrospective: A Look at the Themes & Events that Shaped the 2022 Cyber Landscape
-
Escalation of Information Stealer Capabilities Targeting Valid Accounts Increases Risk Into 2023
-
Australia Seeks to Disrupt & Stop Cybercriminal Syndicates with New Task Force
-
Attack Against Tata Power Highlights Cyber Risk to India’s Growing and Increasingly Connected Population
-
Investigating NATO-Themed Phishing Lures With EclecticIQ Intelligence Center and Endpoint Response Tool
-
OSINT 101: An Introduction to Sock Puppets
-
U.S. Seeks to Incentivize Semiconductor Manufacturing Domestically
-
The Analyst Prompt #16: Monero's Hard Fork Enhances Privacy and May Make It More Attractive to Cybercriminals
-
Long Term Analysis Illustrates How Risk Posed by a Vulnerability Changes as Exploits Develop Over Time
-
Threat Actors Merging Malicious Activity With Cryptocurrency Show How the Attack Landscape is Developing in Decentralized Finance
-
The Analyst Prompt #13: Zero-Day Vulnerabilities and Sophisticated Spyware Make a Case for Layered Security.
-
The Analyst Prompt #12: Harmony Blockchain Confirms Compromise and Theft of Approximately $100 Million USD
-
The Analyst Prompt #11: Exploitation of Atlassian and Microsoft's Major Vulnerability
-
The Analyst Prompt #10: AI Facial Recognition Used in Ukraine/Russia War Prone to Vulnerabilities
-
The Analyst Prompt #09: Longtime Threat Actor Group REvil May be Returning to the Cyber Fight
-
The Analyst Prompt #03 - SPECIAL EDITION: A Look at Cyber as a Tool of War in the Russia-Ukraine Conflict
-
Countering the Ransomware Threat When There Is No Silver Bullet
-
What does it mean to “Phight the Phish?”
-
What's It Mean to Be Cyber Smart?
-
Ransomware: Hope for the Best, Prepare for the Worst
-
REvil and Darkside Successor Launches Operations as United States Establishes Joint Cyber Defense Collaborative
-
Recent Articles Highlight Threat Actors’ Propensity for Focused Targeting of Different Victim Groups
-
An Accelerating Ransomware Threat Needs a Strong Cyber Defense
-
Ransom Demands Hit a New Monetary Milestone
-
Kaseya-MSP Clients Remain at Very High Risk of Further Targeted Attacks
-
Escalating Attacks Stretch Across Nations and Industries
-
Threat Actors Continually Expand and Evolve Tools, Techniques, and Associations with Other Groups
-
Rapid TTP Development and Syndicate Adoption Ignite Q2 Ransomware Explosion
-
Ransomware Is Everywhere, It Seems
-
Attacks Target Multiple Industry Sectors, from Freight to Food and Medical
-
Ransomware Evolves with New Tools and Collaborations
-
Multiple APT Groups Exploit Exchange Server Vulnerabilities
-
Microsoft Under Pressure from Zero Day Vulnerabilities and SolarWinds Targeting
-
Ransomware Groups Turn Up the Heat by Adding DDoS Attacks
-
Threat actors leverage Microsoft RDP service and RTF files
-
Attacks Target Healthcare Sector, Including COVID-19 Vaccine Research
-
Compromise of SolarWinds Software Has Huge Global Impact
-
APT Targets COVID-19 Vaccine Supply Chain and Vulnerability in Cisco Security
-
Cobalt Strike Leak, Oracle Vulnerability & Maze Shutdown
-
EclecticIQ Monthly Vulnerability Trend Report - September 2020
-
EclecticIQ Monthly Vulnerability Trend Report - July 2020
-
CTI Investigation into COVID-19 Contact Tracing Apps
-
WannaCry 3 Years Later, Could it Happen Again?
-
Evolving Ransomware Threat in the Energy Sector
-
EclecticIQ Monthly Vulnerability Trend Report - March 2020
-
Investigating Phishing Attacks Exploiting Coronavirus Themes
-
EclecticIQ Monthly Vulnerability Trend Report - January 2020
-
2019 CTI Trends and 2020 Predictions
-
EclecticIQ Monthly Vulnerability Trend Report - October 2019
-
The Ransomware Evolution Landscape Part 3 – The New Age of Ransomware and the ‘Triple Threat’
-
The Ransomware Evolution Landscape Part 2 – GandCrab, Sodinokibi and How to Scam a RaaS Operator
-
The Ransomware Evolution Landscape Part 1 – The Rise of the Biggest Cyberthreat
-
EclecticIQ Monthly Vulnerability Trend Report – April 2019
-
EclecticIQ Monthly Vulnerability Trend Report – March 2019
-
2019 Ransomware Snapshot: Understanding the Current Landscape
-
EclecticIQ Monthly Vulnerability Trend Report - December 2018
-
EclecticIQ Analysis: 2018 Trend Report