Anomali Threat Research

Anomali's Threat Research team continually tracks security threats to identify when new, highly critical security threats emerge. The Anomali Threat Research team's briefings discuss current threats and risks like botnets, data breaches, misconfigurations, ransomware, threat groups, and various vulnerabilities. The team also creates free and premium threat intelligence feeds for Anomali's industry-leading Threat Intelligence Platform, ThreatStream.

Anomali Threat Research Blog

The Iran Cyber Threat Machine Isn’t Slowing Down — Here’s What CISOs Need to Know Now
The Iran Cyber Threat Machine Isn’t Slowing Down — Here’s What CISOs Need to Know Now
Published on:
April 2, 2026
Blog

The Iran Cyber Threat Machine Isn’t Slowing Down — Here’s What CISOs Need to Know Now

Read More
Iran's Cyber War Machine Hits Full Stride: What CISOs Must Do Right Now
Iran's Cyber War Machine Hits Full Stride: What CISOs Must Do Right Now
Published on:
April 1, 2026
Blog

Iran's Cyber War Machine Hits Full Stride: What CISOs Must Do Right Now

Read More
Iran Cyber War, Day 32: FBI Director Breached, Critical Infrastructure Under Siege, and the Silence That Should Worry You Most
Iran Cyber War, Day 32: FBI Director Breached, Critical Infrastructure Under Siege, and the Silence That Should Worry You Most
Published on:
March 31, 2026
Blog

Iran Cyber War, Day 32: FBI Director Breached, Critical Infrastructure Under Siege, and the Silence That Should Worry You Most

Read More
When Ceasefires Don’t Apply to Cyberspace: 30 Days Into the Iran Cyber War, the Threat Has Never Been Higher
When Ceasefires Don’t Apply to Cyberspace: 30 Days Into the Iran Cyber War, the Threat Has Never Been Higher
Published on:
March 30, 2026
Blog

When Ceasefires Don’t Apply to Cyberspace: 30 Days Into the Iran Cyber War, the Threat Has Never Been Higher

Read More
When the Bombs Pause, the Hackers Don't: Iran's Cyber War Enters Its Most Dangerous Phase
When the Bombs Pause, the Hackers Don't: Iran's Cyber War Enters Its Most Dangerous Phase
Published on:
March 27, 2026
Blog

When the Bombs Pause, the Hackers Don't: Iran's Cyber War Enters Its Most Dangerous Phase

Read More
When Ransomware Meets Statecraft: Iran's Cyber War Enters Its Most Dangerous Phase
When Ransomware Meets Statecraft: Iran's Cyber War Enters Its Most Dangerous Phase
Published on:
March 26, 2026
Blog

When Ransomware Meets Statecraft: Iran's Cyber War Enters Its Most Dangerous Phase

Read More
Iran’s Cyber War Enters Its Mature Phase: What CISOs Must Act On Now
Iran’s Cyber War Enters Its Mature Phase: What CISOs Must Act On Now
Published on:
March 25, 2026
Blog

Iran’s Cyber War Enters Its Mature Phase: What CISOs Must Act On Now

Read More
Iran's Cyber War Enters Its Fourth Week: What CISOs Must Do Now
Iran's Cyber War Enters Its Fourth Week: What CISOs Must Do Now
Published on:
March 24, 2026
Blog

Iran's Cyber War Enters Its Fourth Week: What CISOs Must Do Now

Read More
Iran's Cyber War Enters a New Phase: State-directed Destruction, Synchronized Strikes, and the 24-Hour Reconstitution Problem
Iran's Cyber War Enters a New Phase: State-directed Destruction, Synchronized Strikes, and the 24-Hour Reconstitution Problem
Published on:
March 23, 2026
Blog

Iran's Cyber War Enters a New Phase: State-directed Destruction, Synchronized Strikes, and the 24-Hour Reconstitution Problem

Read More
Iran's Cyber War Machine Is Damaged — But Still Firing. Here's What CISOs Need to Know Now.
Iran's Cyber War Machine Is Damaged — But Still Firing. Here's What CISOs Need to Know Now.
Published on:
March 20, 2026
Blog

Iran's Cyber War Machine Is Damaged — But Still Firing. Here's What CISOs Need to Know Now.

Read More
Daily CTI Cycle: Geopolitical/Military on Iran
Daily CTI Cycle: Geopolitical/Military on Iran
Published on:
March 19, 2026
Blog

Daily CTI Cycle: Geopolitical/Military on Iran

Read More
Iran's Cyber War Enters a Dangerous New Phase: What CISOs Must Do Now
Iran's Cyber War Enters a Dangerous New Phase: What CISOs Must Do Now
Published on:
March 18, 2026
Blog

Iran's Cyber War Enters a Dangerous New Phase: What CISOs Must Do Now

Read More
Iran's Cyber War Enters a New Phase: No Malware Needed — What CISOs Must Do Now
Iran's Cyber War Enters a New Phase: No Malware Needed — What CISOs Must Do Now
Published on:
March 17, 2026
Blog

Iran's Cyber War Enters a New Phase: No Malware Needed — What CISOs Must Do Now

Read More
The Cyber Front Is Now a Killing Field: What CISOs Must Know About the Iran Conflict at Day 16
The Cyber Front Is Now a Killing Field: What CISOs Must Know About the Iran Conflict at Day 16
Published on:
March 16, 2026
Blog

The Cyber Front Is Now a Killing Field: What CISOs Must Know About the Iran Conflict at Day 16

Read More
The Iran Cyber War Just Hit Home: What CISOs Need to Know Right Now
The Iran Cyber War Just Hit Home: What CISOs Need to Know Right Now
Published on:
March 13, 2026
Blog

The Iran Cyber War Just Hit Home: What CISOs Need to Know Right Now

Read More
Iran's Cyber War Has Gone Destructive: What CISOs Need to Know Right Now
Iran's Cyber War Has Gone Destructive: What CISOs Need to Know Right Now
Published on:
March 12, 2026
Blog

Iran's Cyber War Has Gone Destructive: What CISOs Need to Know Right Now

Read More
Iran's Cyber War Is Here: What CISOs Need to Know Right Now
Iran's Cyber War Is Here: What CISOs Need to Know Right Now
Published on:
March 11, 2026
Blog

Iran's Cyber War Is Here: What CISOs Need to Know Right Now

Read More
The Iran Conflict’s Cyber Front Is Escalating - And the Most Dangerous Phase Is Still Ahead
The Iran Conflict’s Cyber Front Is Escalating - And the Most Dangerous Phase Is Still Ahead
Published on:
March 10, 2026
Blog

The Iran Conflict’s Cyber Front Is Escalating - And the Most Dangerous Phase Is Still Ahead

Read More
The Silence Before the Storm: Iran's Cyber War Has Moved From Warning to Confirmed Compromise
The Silence Before the Storm: Iran's Cyber War Has Moved From Warning to Confirmed Compromise
Published on:
March 9, 2026
Blog

The Silence Before the Storm: Iran's Cyber War Has Moved From Warning to Confirmed Compromise

Read More
When “Quiet" Means Pre-Positioned: Why Iranian Cyber Threats Are More Dangerous Than Headlines Suggest
When “Quiet" Means Pre-Positioned: Why Iranian Cyber Threats Are More Dangerous Than Headlines Suggest
Published on:
March 6, 2026
Blog

When “Quiet" Means Pre-Positioned: Why Iranian Cyber Threats Are More Dangerous Than Headlines Suggest

Read More
The Deceptive Lull: Why the Iran Cyber Conflict's Real Threat Isn't the One Making Headlines
The Deceptive Lull: Why the Iran Cyber Conflict's Real Threat Isn't the One Making Headlines
Published on:
March 5, 2026
Blog

The Deceptive Lull: Why the Iran Cyber Conflict's Real Threat Isn't the One Making Headlines

Read More
The Silence Before the Storm: Why Saudi Arabia's Financial Sector Faces Its Most Dangerous Cyber Threat Window in a Decade
The Silence Before the Storm: Why Saudi Arabia's Financial Sector Faces Its Most Dangerous Cyber Threat Window in a Decade
Published on:
March 4, 2026
Blog

The Silence Before the Storm: Why Saudi Arabia's Financial Sector Faces Its Most Dangerous Cyber Threat Window in a Decade

Read More
When the Supreme Leader Falls: What Iran's Cyber Arsenal Means for Your Organization Right Now
When the Supreme Leader Falls: What Iran's Cyber Arsenal Means for Your Organization Right Now
Published on:
March 4, 2026
Blog

When the Supreme Leader Falls: What Iran's Cyber Arsenal Means for Your Organization Right Now

Read More
The Cyber Front of Operation Epic Fury: What CISOs Need to Know Right Now
The Cyber Front of Operation Epic Fury: What CISOs Need to Know Right Now
Published on:
March 3, 2026
Blog

The Cyber Front of Operation Epic Fury: What CISOs Need to Know Right Now

Read More
Anomali Cyber Watch: Iran Cyber Threat, Scattered Lapsus$ Hunters Recruits, Medusa Ransomware, and more
Anomali Cyber Watch: Iran Cyber Threat, Scattered Lapsus$ Hunters Recruits, Medusa Ransomware, and more
Published on:
March 3, 2026
Blog

Anomali Cyber Watch: Iran Cyber Threat, Scattered Lapsus$ Hunters Recruits, Medusa Ransomware, and more

Read More
Iran's Cyber Retaliation Clock Is Ticking: What CISOs Need to Know Right Now
Iran's Cyber Retaliation Clock Is Ticking: What CISOs Need to Know Right Now
Published on:
March 2, 2026
Blog

Iran's Cyber Retaliation Clock Is Ticking: What CISOs Need to Know Right Now

Read More
Israel in Focus: Iran Retaliatory Posture
Israel in Focus: Iran Retaliatory Posture
Published on:
February 28, 2026
Blog

Israel in Focus: Iran Retaliatory Posture

Read More
Cyber Threat Briefing: Iran Retaliatory Posture
Cyber Threat Briefing: Iran Retaliatory Posture
Published on:
February 28, 2026
Blog

Cyber Threat Briefing: Iran Retaliatory Posture

Read More
Anomali Cyber Watch: LockBit 5.0, Chrome Zero-Day CVE-2026-2441, Infostealer Targets OpenClaw, and more
Anomali Cyber Watch: LockBit 5.0, Chrome Zero-Day CVE-2026-2441, Infostealer Targets OpenClaw, and more
Published on:
February 24, 2026
Blog

Anomali Cyber Watch: LockBit 5.0, Chrome Zero-Day CVE-2026-2441, Infostealer Targets OpenClaw, and more

Read More
Anomali Cyber Watch: Zero-Click Affects Claude, SolarWinds Vulnerabilities for Velociraptor and more
Anomali Cyber Watch: Zero-Click Affects Claude, SolarWinds Vulnerabilities for Velociraptor and more
Published on:
February 17, 2026
Blog

Anomali Cyber Watch: Zero-Click Affects Claude, SolarWinds Vulnerabilities for Velociraptor and more

Read More
Anomali Cyber Watch: Notepad++ Attack, RAT Uses Hugging Face, Microsoft Office Flaw and more
Anomali Cyber Watch: Notepad++ Attack, RAT Uses Hugging Face, Microsoft Office Flaw and more
Published on:
February 10, 2026
Blog

Anomali Cyber Watch: Notepad++ Attack, RAT Uses Hugging Face, Microsoft Office Flaw and more

Read More
Anomali Cyber Watch: Stanley Malware Toolkit, ShinyHunters, Vulnerability in WhatsApp and more
Anomali Cyber Watch: Stanley Malware Toolkit, ShinyHunters, Vulnerability in WhatsApp and more
Published on:
February 3, 2026
Blog

Anomali Cyber Watch: Stanley Malware Toolkit, ShinyHunters, Vulnerability in WhatsApp and more

Read More
Anomali Cyber Watch: Evelyn Stealer Abuses, PDFSider Malware, Open-Source Tools Deploy RAT and more
Anomali Cyber Watch: Evelyn Stealer Abuses, PDFSider Malware, Open-Source Tools Deploy RAT and more
Published on:
January 27, 2026
Blog

Anomali Cyber Watch: Evelyn Stealer Abuses, PDFSider Malware, Open-Source Tools Deploy RAT and more

Read More
Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more
Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more
Published on:
January 20, 2026
Blog

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

Read More
Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more
Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more
Published on:
January 13, 2026
Blog

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Read More
Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more
Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more
Published on:
January 6, 2026
Blog

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Read More
Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more
Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more
Published on:
December 23, 2025
Blog

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

Read More
Anomali Cyber Watch: GhostPenguin, SharePoint Exploits, Android Spyware, CastleLoader Malware Expansion, and more
Anomali Cyber Watch: GhostPenguin, SharePoint Exploits, Android Spyware, CastleLoader Malware Expansion, and more
Published on:
December 16, 2025
Blog

Anomali Cyber Watch: GhostPenguin, SharePoint Exploits, Android Spyware, CastleLoader Malware Expansion, and more

Read More
Anomali Cyber Watch: React and Next.js RCE Vulnerabilities, "Evil Twin" Wifi Networks, Record 29.7 Tbps DDoS Attack, and More
Anomali Cyber Watch: React and Next.js RCE Vulnerabilities, "Evil Twin" Wifi Networks, Record 29.7 Tbps DDoS Attack, and More
Published on:
December 9, 2025
Blog

Anomali Cyber Watch: React and Next.js RCE Vulnerabilities, "Evil Twin" Wifi Networks, Record 29.7 Tbps DDoS Attack, and More

Read More
Anomali Cyber Watch: ShadowPad Backdoor, Password Strength Analysis, HashJack, FlexibleFerret, and More
Anomali Cyber Watch: ShadowPad Backdoor, Password Strength Analysis, HashJack, FlexibleFerret, and More
Published on:
December 2, 2025
Blog

Anomali Cyber Watch: ShadowPad Backdoor, Password Strength Analysis, HashJack, FlexibleFerret, and More

Read More
Anomali Cyber Watch: New Chrome Zero-Day, Sneaky 2FA Phishing Kit, DigitStealer, APT24 "BadAudio" Malware, and More
Anomali Cyber Watch: New Chrome Zero-Day, Sneaky 2FA Phishing Kit, DigitStealer, APT24 "BadAudio" Malware, and More
Published on:
November 25, 2025
Blog

Anomali Cyber Watch: New Chrome Zero-Day, Sneaky 2FA Phishing Kit, DigitStealer, APT24 "BadAudio" Malware, and More

Read More
Anomali Cyber Watch: OWASP Top Ten Updates, AI Voice Scams, DanaBot Malware, Lumma Stealer, and More
Anomali Cyber Watch: OWASP Top Ten Updates, AI Voice Scams, DanaBot Malware, Lumma Stealer, and More
Published on:
November 18, 2025
Blog

Anomali Cyber Watch: OWASP Top Ten Updates, AI Voice Scams, DanaBot Malware, Lumma Stealer, and More

Read More
Anomali Cyber Watch: SesameOp Backdoor, DragonForce Cartel, Gootloader Malware, and More
Anomali Cyber Watch: SesameOp Backdoor, DragonForce Cartel, Gootloader Malware, and More
Published on:
November 11, 2025
Blog

Anomali Cyber Watch: SesameOp Backdoor, DragonForce Cartel, Gootloader Malware, and More

Read More
Anomali Cyber Watch: Typosquatted npm Packages, Qilin Ransomware, New Water Saci Campaign, and More
Anomali Cyber Watch: Typosquatted npm Packages, Qilin Ransomware, New Water Saci Campaign, and More
Published on:
November 4, 2025
Blog

Anomali Cyber Watch: Typosquatted npm Packages, Qilin Ransomware, New Water Saci Campaign, and More

Read More
Anomali Cyber Watch: "ROBOT" Malware Suite, GlassWorm, Vidar Stealer 2.0, and More
Anomali Cyber Watch: "ROBOT" Malware Suite, GlassWorm, Vidar Stealer 2.0, and More
Published on:
October 28, 2025
Blog

Anomali Cyber Watch: "ROBOT" Malware Suite, GlassWorm, Vidar Stealer 2.0, and More

Read More
Anomali Cyber Watch: F5 Breach, Mysterious Elephant APT, Malicious MCP Servers, and More
Anomali Cyber Watch: F5 Breach, Mysterious Elephant APT, Malicious MCP Servers, and More
Published on:
October 21, 2025
Blog

Anomali Cyber Watch: F5 Breach, Mysterious Elephant APT, Malicious MCP Servers, and More

Read More
Anomali Cyber Watch: Oracle E-Business Suite Zero-Day, Vampire Bot Malware, XWorm 6.0, and More
Anomali Cyber Watch: Oracle E-Business Suite Zero-Day, Vampire Bot Malware, XWorm 6.0, and More
Published on:
October 14, 2025
Blog

Anomali Cyber Watch: Oracle E-Business Suite Zero-Day, Vampire Bot Malware, XWorm 6.0, and More

Read More
Anomali Cyber Watch: Phantom Taurus, MatrixPDF, Klopatra, and More
Anomali Cyber Watch: Phantom Taurus, MatrixPDF, Klopatra, and More
Published on:
October 7, 2025
Blog

Anomali Cyber Watch: Phantom Taurus, MatrixPDF, Klopatra, and More

Read More
Anomali Cyber Watch: Nimbus Manticore, Spoofed IC3 Portals, a Record-Breaking DDoS Attack, and More
Anomali Cyber Watch: Nimbus Manticore, Spoofed IC3 Portals, a Record-Breaking DDoS Attack, and More
Published on:
September 30, 2025
Blog

Anomali Cyber Watch: Nimbus Manticore, Spoofed IC3 Portals, a Record-Breaking DDoS Attack, and More

Read More
Anomali Cyber Watch: FileFix Phishing, AI-Driven Pen-Testing, the Return of Scattered Spider, and More
Anomali Cyber Watch: FileFix Phishing, AI-Driven Pen-Testing, the Return of Scattered Spider, and More
Published on:
September 23, 2025
Blog

Anomali Cyber Watch: FileFix Phishing, AI-Driven Pen-Testing, the Return of Scattered Spider, and More

Read More
Anomali Cyber Watch: Salesloft Drift Breach, Salty2FA Phishing, GPUGate Malware, and More
Anomali Cyber Watch: Salesloft Drift Breach, Salty2FA Phishing, GPUGate Malware, and More
Published on:
September 16, 2025
Blog

Anomali Cyber Watch: Salesloft Drift Breach, Salty2FA Phishing, GPUGate Malware, and More

Read More
Anomali Cyber Watch: APT 29, APT37, Silver Fox, Grok AI Exploits, and More
Anomali Cyber Watch: APT 29, APT37, Silver Fox, Grok AI Exploits, and More
Published on:
September 9, 2025
Blog

Anomali Cyber Watch: APT 29, APT37, Silver Fox, Grok AI Exploits, and More

Read More
Anomali Cyber Watch: PromptLock Ransomware, Blind Eagle, Lovable Website Attacks, and More
Anomali Cyber Watch: PromptLock Ransomware, Blind Eagle, Lovable Website Attacks, and More
Published on:
September 2, 2025
Blog

Anomali Cyber Watch: PromptLock Ransomware, Blind Eagle, Lovable Website Attacks, and More

Read More
Anomali Cyber Watch: Noodlophile Stealer, GodRAT, Apple ImageIO Zero-Day, and More
Anomali Cyber Watch: Noodlophile Stealer, GodRAT, Apple ImageIO Zero-Day, and More
Published on:
August 26, 2025
Blog

Anomali Cyber Watch: Noodlophile Stealer, GodRAT, Apple ImageIO Zero-Day, and More

Read More
Anomali Cyber Watch: WinRAR Malware, Erlang OTP Exploitation, Charon Ransomware, and More
Anomali Cyber Watch: WinRAR Malware, Erlang OTP Exploitation, Charon Ransomware, and More
Published on:
August 19, 2025
Blog

Anomali Cyber Watch: WinRAR Malware, Erlang OTP Exploitation, Charon Ransomware, and More

Read More
Anomali Cyber Watch: PXA Stealer, ClickFix Malware, Fake TikTok Shops, Throttlestop, and More
Anomali Cyber Watch: PXA Stealer, ClickFix Malware, Fake TikTok Shops, Throttlestop, and More
Published on:
August 12, 2025
Blog

Anomali Cyber Watch: PXA Stealer, ClickFix Malware, Fake TikTok Shops, Throttlestop, and More

Read More
Detecting the ToolShell SharePoint Exploit
Detecting the ToolShell SharePoint Exploit
Published on:
August 11, 2025
Blog

Detecting the ToolShell SharePoint Exploit

Read More
Anomali Cyber Watch: SHUYAL Infostealer, PyPI Phishing Campaign, Gunra Ransomware, UNC2891, and More
Anomali Cyber Watch: SHUYAL Infostealer, PyPI Phishing Campaign, Gunra Ransomware, UNC2891, and More
Published on:
August 4, 2025
Blog

Anomali Cyber Watch: SHUYAL Infostealer, PyPI Phishing Campaign, Gunra Ransomware, UNC2891, and More

Read More
Anomali Cyber Watch: APT41, PoisonSeed Attacks, ToolShell Vulnerability, DCHSpy, Android Malware, and More
Anomali Cyber Watch: APT41, PoisonSeed Attacks, ToolShell Vulnerability, DCHSpy, Android Malware, and More
Published on:
July 28, 2025
Blog

Anomali Cyber Watch: APT41, PoisonSeed Attacks, ToolShell Vulnerability, DCHSpy, Android Malware, and More

Read More
Anomali Cyber Watch: Interlock RAT, North Koreans Flood npm Registry, Stealthy WordPress PHP Malware, and Semiconductor Sector Hacks
Anomali Cyber Watch: Interlock RAT, North Koreans Flood npm Registry, Stealthy WordPress PHP Malware, and Semiconductor Sector Hacks
Published on:
July 22, 2025
Blog

Anomali Cyber Watch: Interlock RAT, North Koreans Flood npm Registry, Stealthy WordPress PHP Malware, and Semiconductor Sector Hacks

Read More
Anomali Cyber Watch: BERT Ransomware Group, Employee Login Credential Attacks, Malicious Chrome Extensions, and More
Anomali Cyber Watch: BERT Ransomware Group, Employee Login Credential Attacks, Malicious Chrome Extensions, and More
Published on:
July 17, 2025
Blog

Anomali Cyber Watch: BERT Ransomware Group, Employee Login Credential Attacks, Malicious Chrome Extensions, and More

Read More
Anomali Cyber Watch: Scattered Spider Hacking Spree, Iranian Cyber Threats, PDF Phishing Campaigns, and More
Anomali Cyber Watch: Scattered Spider Hacking Spree, Iranian Cyber Threats, PDF Phishing Campaigns, and More
Published on:
July 10, 2025
Blog

Anomali Cyber Watch: Scattered Spider Hacking Spree, Iranian Cyber Threats, PDF Phishing Campaigns, and More

Read More
Anomali Cyber Watch: TA4903 Spoofs U.S. Agencies for BEC, Malicious Script Hijacks Browsers to Conduct WordPress Brute Force, and More
Anomali Cyber Watch: TA4903 Spoofs U.S. Agencies for BEC, Malicious Script Hijacks Browsers to Conduct WordPress Brute Force, and More
Published on:
March 11, 2024
Blog

Anomali Cyber Watch: TA4903 Spoofs U.S. Agencies for BEC, Malicious Script Hijacks Browsers to Conduct WordPress Brute Force, and More

Read More
Anomali Cyber Watch: Lazarus Exploited Admin-to-Kernel Zero-Day, Fancy Bear Has Been Using Compromised Ubiquiti EdgeRouters, and More
Anomali Cyber Watch: Lazarus Exploited Admin-to-Kernel Zero-Day, Fancy Bear Has Been Using Compromised Ubiquiti EdgeRouters, and More
Published on:
March 5, 2024
Blog

Anomali Cyber Watch: Lazarus Exploited Admin-to-Kernel Zero-Day, Fancy Bear Has Been Using Compromised Ubiquiti EdgeRouters, and More

Read More
Anomali Cyber Watch: Volt Typhoon Maintained Access to US Critical Infrastructure, New MoqHao Variants Launch Automatically, and More.
Anomali Cyber Watch: Volt Typhoon Maintained Access to US Critical Infrastructure, New MoqHao Variants Launch Automatically, and More.
Published on:
February 14, 2024
Blog

Anomali Cyber Watch: Volt Typhoon Maintained Access to US Critical Infrastructure, New MoqHao Variants Launch Automatically, and More.

Read More
Anomali Cyber Watch: NSPX30 Implant Relies on Network Interception, Mustang Panda Spies on Myanmar Government, and More
Anomali Cyber Watch: NSPX30 Implant Relies on Network Interception, Mustang Panda Spies on Myanmar Government, and More
Published on:
January 30, 2024
Blog

Anomali Cyber Watch: NSPX30 Implant Relies on Network Interception, Mustang Panda Spies on Myanmar Government, and More

Read More
Anomali Cyber Watch: China-Sponsored UNC3886 Had Zero-Day Access to VMWare ESXi Hosts, ColdRiver Authored First Custom Backdoor, and More
Anomali Cyber Watch: China-Sponsored UNC3886 Had Zero-Day Access to VMWare ESXi Hosts, ColdRiver Authored First Custom Backdoor, and More
Published on:
January 22, 2024
Blog

Anomali Cyber Watch: China-Sponsored UNC3886 Had Zero-Day Access to VMWare ESXi Hosts, ColdRiver Authored First Custom Backdoor, and More

Read More
Anomali Cyber Watch: China-Sponsored Group Exploits Ivanti Devices, RE#TURGENCE Targets MSSQL Servers to Deliver MIMIC Ransomware, and More
Anomali Cyber Watch: China-Sponsored Group Exploits Ivanti Devices, RE#TURGENCE Targets MSSQL Servers to Deliver MIMIC Ransomware, and More
Published on:
January 16, 2024
Blog

Anomali Cyber Watch: China-Sponsored Group Exploits Ivanti Devices, RE#TURGENCE Targets MSSQL Servers to Deliver MIMIC Ransomware, and More

Read More
Anomali Cyber Watch: Sea Turtle Adopted Open-Source Linux Tools, AsyncRAT Delivered by GIF Attachments, and More
Anomali Cyber Watch: Sea Turtle Adopted Open-Source Linux Tools, AsyncRAT Delivered by GIF Attachments, and More
Published on:
January 9, 2024
Blog

Anomali Cyber Watch: Sea Turtle Adopted Open-Source Linux Tools, AsyncRAT Delivered by GIF Attachments, and More

Read More
Anomali Cyber Watch: Infostealers Target Google Oauth MultiLogin Endpoint, Kimsuky Adopts Chrome Remote Desktop C2 Communication, and More
Anomali Cyber Watch: Infostealers Target Google Oauth MultiLogin Endpoint, Kimsuky Adopts Chrome Remote Desktop C2 Communication, and More
Published on:
January 5, 2024
Blog

Anomali Cyber Watch: Infostealers Target Google Oauth MultiLogin Endpoint, Kimsuky Adopts Chrome Remote Desktop C2 Communication, and More

Read More
Anomali Cyber Watch: APT33 Employs New FalseFont Backdoor, Play Ransomware Impacted Around 300 Organizations, and More
Anomali Cyber Watch: APT33 Employs New FalseFont Backdoor, Play Ransomware Impacted Around 300 Organizations, and More
Published on:
December 27, 2023
Blog

Anomali Cyber Watch: APT33 Employs New FalseFont Backdoor, Play Ransomware Impacted Around 300 Organizations, and More

Read More
Anomali Cyber Watch: Storm-0539 Activates Holiday Gift Card Frauds, NKAbuse Hides in the NKN Blockchain Traffic, and More
Anomali Cyber Watch: Storm-0539 Activates Holiday Gift Card Frauds, NKAbuse Hides in the NKN Blockchain Traffic, and More
Published on:
December 19, 2023
Blog

Anomali Cyber Watch: Storm-0539 Activates Holiday Gift Card Frauds, NKAbuse Hides in the NKN Blockchain Traffic, and More

Read More
Anomali Cyber Watch: Lazarus Adopts DLang Programming Language, Krasue Facilitates Covert Access on Infected Linux, and More
Anomali Cyber Watch: Lazarus Adopts DLang Programming Language, Krasue Facilitates Covert Access on Infected Linux, and More
Published on:
December 11, 2023
Blog

Anomali Cyber Watch: Lazarus Adopts DLang Programming Language, Krasue Facilitates Covert Access on Infected Linux, and More

Read More
Anomali Cyber Watch: Iran-Linked Cyber Av3ngers Target US Water Utility, Gaza Cybergang Ports SysJoker to Rust, and More
Anomali Cyber Watch: Iran-Linked Cyber Av3ngers Target US Water Utility, Gaza Cybergang Ports SysJoker to Rust, and More
Published on:
November 28, 2023
Blog

Anomali Cyber Watch: Iran-Linked Cyber Av3ngers Target US Water Utility, Gaza Cybergang Ports SysJoker to Rust, and More

Read More
Anomali Cyber Watch: Lumma Stealer Waits for Human Mouse Movements, LitterDrifter USB Worm Spreads beyond Ukraine, and More
Anomali Cyber Watch: Lumma Stealer Waits for Human Mouse Movements, LitterDrifter USB Worm Spreads beyond Ukraine, and More
Published on:
November 20, 2023
Blog

Anomali Cyber Watch: Lumma Stealer Waits for Human Mouse Movements, LitterDrifter USB Worm Spreads beyond Ukraine, and More

Read More
Anomali Cyber Watch: LockBit Disrupts US Subsidiary of Largest Chinese Bank, Sandworm Causes Another Blackout in Ukraine, and More
Anomali Cyber Watch: LockBit Disrupts US Subsidiary of Largest Chinese Bank, Sandworm Causes Another Blackout in Ukraine, and More
Published on:
November 15, 2023
Blog

Anomali Cyber Watch: LockBit Disrupts US Subsidiary of Largest Chinese Bank, Sandworm Causes Another Blackout in Ukraine, and More

Read More
Anomali Cyber Watch: Three Wipers Targeting Israel, macOS Malware Disguised as Code Challenge by Lazarus, and More
Anomali Cyber Watch: Three Wipers Targeting Israel, macOS Malware Disguised as Code Challenge by Lazarus, and More
Published on:
November 7, 2023
Blog

Anomali Cyber Watch: Three Wipers Targeting Israel, macOS Malware Disguised as Code Challenge by Lazarus, and More

Read More
Anomali Cyber Watch: Lazarus Unveils SIGNBT Backdoor, StripedFly Framework Exploiting EternalBlue for 7 Years, and More
Anomali Cyber Watch: Lazarus Unveils SIGNBT Backdoor, StripedFly Framework Exploiting EternalBlue for 7 Years, and More
Published on:
October 31, 2023
Blog

Anomali Cyber Watch: Lazarus Unveils SIGNBT Backdoor, StripedFly Framework Exploiting EternalBlue for 7 Years, and More

Read More
Anomali Cyber Watch: Updated Payload Targets Cisco IOS XE, OilRig Sends C2 Commands via Email, and More
Anomali Cyber Watch: Updated Payload Targets Cisco IOS XE, OilRig Sends C2 Commands via Email, and More
Published on:
October 24, 2023
Blog

Anomali Cyber Watch: Updated Payload Targets Cisco IOS XE, OilRig Sends C2 Commands via Email, and More

Read More
Anomali Cyber Watch: RomCom 4.0 Targeted Female Politicians, Israeli RedAlert App Impersonated, and More
Anomali Cyber Watch: RomCom 4.0 Targeted Female Politicians, Israeli RedAlert App Impersonated, and More
Published on:
October 17, 2023
Blog

Anomali Cyber Watch: RomCom 4.0 Targeted Female Politicians, Israeli RedAlert App Impersonated, and More

Read More
Anomali Cyber Watch: Red Alert Compromised Amid Hamas Attack, Qakbot Operators Continue with Other Malware, and More
Anomali Cyber Watch: Red Alert Compromised Amid Hamas Attack, Qakbot Operators Continue with Other Malware, and More
Published on:
October 11, 2023
Blog

Anomali Cyber Watch: Red Alert Compromised Amid Hamas Attack, Qakbot Operators Continue with Other Malware, and More

Read More
Anomali Cyber Watch: LightlessCan Incorporates Windows Utility Functions, ZenRAT Avoids Disks under 95GB, and More
Anomali Cyber Watch: LightlessCan Incorporates Windows Utility Functions, ZenRAT Avoids Disks under 95GB, and More
Published on:
October 3, 2023
Blog

Anomali Cyber Watch: LightlessCan Incorporates Windows Utility Functions, ZenRAT Avoids Disks under 95GB, and More

Read More
Anomali Cyber Watch: iPhone Zero-Days Used to Install Predator Spyware, Stealthy Deadglyph Resides in the Registry, and More
Anomali Cyber Watch: iPhone Zero-Days Used to Install Predator Spyware, Stealthy Deadglyph Resides in the Registry, and More
Published on:
September 26, 2023
Blog

Anomali Cyber Watch: iPhone Zero-Days Used to Install Predator Spyware, Stealthy Deadglyph Resides in the Registry, and More

Read More
Anomali Cyber Watch: APT33 Sprays Passwords on Iranian Time, NodeStealer Hides Behind Wrong Encoding, and More
Anomali Cyber Watch: APT33 Sprays Passwords on Iranian Time, NodeStealer Hides Behind Wrong Encoding, and More
Published on:
September 18, 2023
Blog

Anomali Cyber Watch: APT33 Sprays Passwords on Iranian Time, NodeStealer Hides Behind Wrong Encoding, and More

Read More
Anomali Cyber Watch: XModule Quietly Processes Resort Data, Fancy Bear Abused Mocky API, and More
Anomali Cyber Watch: XModule Quietly Processes Resort Data, Fancy Bear Abused Mocky API, and More
Published on:
September 12, 2023
Blog

Anomali Cyber Watch: XModule Quietly Processes Resort Data, Fancy Bear Abused Mocky API, and More

Read More
Anomali Cyber Watch: Lazarus Typosquats on PyPI, Smishing Triad Impersonates Postal Services on iMessage, and More
Anomali Cyber Watch: Lazarus Typosquats on PyPI, Smishing Triad Impersonates Postal Services on iMessage, and More
Published on:
September 6, 2023
Blog

Anomali Cyber Watch: Lazarus Typosquats on PyPI, Smishing Triad Impersonates Postal Services on iMessage, and More

Read More
Anomali Cyber Watch: FIN8 Exploits Citrix NetScaler, CollectionRAT Added to Lazarus Toolset, Whiffy Recon Reports Windows Device Location, and More
Anomali Cyber Watch: FIN8 Exploits Citrix NetScaler, CollectionRAT Added to Lazarus Toolset, Whiffy Recon Reports Windows Device Location, and More
Published on:
August 29, 2023
Blog

Anomali Cyber Watch: FIN8 Exploits Citrix NetScaler, CollectionRAT Added to Lazarus Toolset, Whiffy Recon Reports Windows Device Location, and More

Read More
Anomali Cyber Watch: LABRAT Is The Stealthiest Resource Hijacking Campaign, Locally-Opened HTML Attachments Impersonate Zimbra Login, and More
Anomali Cyber Watch: LABRAT Is The Stealthiest Resource Hijacking Campaign, Locally-Opened HTML Attachments Impersonate Zimbra Login, and More
Published on:
August 21, 2023
Blog

Anomali Cyber Watch: LABRAT Is The Stealthiest Resource Hijacking Campaign, Locally-Opened HTML Attachments Impersonate Zimbra Login, and More

Read More
Anomali Cyber Watch: Colonial-Like Attack on Critical Infrastructure, New Rhysida Ransomware Resembles Vice Society, and More
Anomali Cyber Watch: Colonial-Like Attack on Critical Infrastructure, New Rhysida Ransomware Resembles Vice Society, and More
Published on:
August 15, 2023
Blog

Anomali Cyber Watch: Colonial-Like Attack on Critical Infrastructure, New Rhysida Ransomware Resembles Vice Society, and More

Read More
Anomali Cyber Watch: Rilide Stealer Bypasses Remote Script Restrictions, Cozy Bear Phished with Microsoft Teams Chat Notifications, ColdRiver Dropped Trailing Naming Convention, and More
Anomali Cyber Watch: Rilide Stealer Bypasses Remote Script Restrictions, Cozy Bear Phished with Microsoft Teams Chat Notifications, ColdRiver Dropped Trailing Naming Convention, and More
Published on:
August 7, 2023
Blog

Anomali Cyber Watch: Rilide Stealer Bypasses Remote Script Restrictions, Cozy Bear Phished with Microsoft Teams Chat Notifications, ColdRiver Dropped Trailing Naming Convention, and More

Read More
Anomali Cyber Watch: Judgment Panda Steals from Air-Gapped Systems, Novel SUBMARINE Backdoor on Barracuda ESG, Nitrogen Framework Utilizes DLL Proxying, and More
Anomali Cyber Watch: Judgment Panda Steals from Air-Gapped Systems, Novel SUBMARINE Backdoor on Barracuda ESG, Nitrogen Framework Utilizes DLL Proxying, and More
Published on:
August 3, 2023
Blog

Anomali Cyber Watch: Judgment Panda Steals from Air-Gapped Systems, Novel SUBMARINE Backdoor on Barracuda ESG, Nitrogen Framework Utilizes DLL Proxying, and More

Read More
Amplify Visibility and Unlock Your SOC
Amplify Visibility and Unlock Your SOC
Published on:
July 26, 2023
Blog

Amplify Visibility and Unlock Your SOC

Read More
Anomali Cyber Watch: Turla Added Kazuar Backdoor, Citrix CVE-2023-3519 Exploited as Zero-Day, FIN8 Rewrote Sardonic, and More
Anomali Cyber Watch: Turla Added Kazuar Backdoor, Citrix CVE-2023-3519 Exploited as Zero-Day, FIN8 Rewrote Sardonic, and More
Published on:
July 25, 2023
Blog

Anomali Cyber Watch: Turla Added Kazuar Backdoor, Citrix CVE-2023-3519 Exploited as Zero-Day, FIN8 Rewrote Sardonic, and More

Read More
Anomali Cyber Watch: Storm-0558 Exploited Microsoft Token Validation Vulnerability, Cozy Bear Targeted Diplomats, PyLoose Uses memfd RAM-Based Filesystem, and More
Anomali Cyber Watch: Storm-0558 Exploited Microsoft Token Validation Vulnerability, Cozy Bear Targeted Diplomats, PyLoose Uses memfd RAM-Based Filesystem, and More
Published on:
July 18, 2023
Blog

Anomali Cyber Watch: Storm-0558 Exploited Microsoft Token Validation Vulnerability, Cozy Bear Targeted Diplomats, PyLoose Uses memfd RAM-Based Filesystem, and More

Read More
Anomali Cyber Watch: Charming Kitten Updated Its Arsenal, BlackByte Ransomware Devastates a Company in Less Than Five Days, PlugX Sent to European Diplomats, and More
Anomali Cyber Watch: Charming Kitten Updated Its Arsenal, BlackByte Ransomware Devastates a Company in Less Than Five Days, PlugX Sent to European Diplomats, and More
Published on:
July 11, 2023
Blog

Anomali Cyber Watch: Charming Kitten Updated Its Arsenal, BlackByte Ransomware Devastates a Company in Less Than Five Days, PlugX Sent to European Diplomats, and More

Read More
Anomali Cyber Watch: Massive Growth of DDoSia Project, Proxyjacking Joins Cryptomining, 8Base Ransomware Became 2d Most Prolific, and More
Anomali Cyber Watch: Massive Growth of DDoSia Project, Proxyjacking Joins Cryptomining, 8Base Ransomware Became 2d Most Prolific, and More
Published on:
July 3, 2023
Blog

Anomali Cyber Watch: Massive Growth of DDoSia Project, Proxyjacking Joins Cryptomining, 8Base Ransomware Became 2d Most Prolific, and More

Read More
Getting Your SOC Aligned with Your Business
Getting Your SOC Aligned with Your Business
Published on:
June 29, 2023
Blog

Getting Your SOC Aligned with Your Business

Read More
Anomali Cyber Watch: SMS Phishing Campaign Targets UPS, USB-Driven Malware Propagation, Evasive BatLoader executes Ransomware, and More
Anomali Cyber Watch: SMS Phishing Campaign Targets UPS, USB-Driven Malware Propagation, Evasive BatLoader executes Ransomware, and More
Published on:
June 27, 2023
Blog

Anomali Cyber Watch: SMS Phishing Campaign Targets UPS, USB-Driven Malware Propagation, Evasive BatLoader executes Ransomware, and More

Read More
Anomali Cyber Watch: Cadet Blizzard - New GRU APT, ChamelDoH Hard-to-Detect Linux RAT, Stealthy DoubleFinger Targets Cryptocurrency
Anomali Cyber Watch: Cadet Blizzard - New GRU APT, ChamelDoH Hard-to-Detect Linux RAT, Stealthy DoubleFinger Targets Cryptocurrency
Published on:
June 21, 2023
Blog

Anomali Cyber Watch: Cadet Blizzard - New GRU APT, ChamelDoH Hard-to-Detect Linux RAT, Stealthy DoubleFinger Targets Cryptocurrency

Read More
Anomali Cyber Watch: Fractureiser Attempted Clipboard-Poisoning VM Escape, Asylum Ambuscade Spies as a Side Job, Stealth Soldier Connected with The Eye on The Nile Campaign, and More
Anomali Cyber Watch: Fractureiser Attempted Clipboard-Poisoning VM Escape, Asylum Ambuscade Spies as a Side Job, Stealth Soldier Connected with The Eye on The Nile Campaign, and More
Published on:
June 13, 2023
Blog

Anomali Cyber Watch: Fractureiser Attempted Clipboard-Poisoning VM Escape, Asylum Ambuscade Spies as a Side Job, Stealth Soldier Connected with The Eye on The Nile Campaign, and More

Read More
Explore More Resources