BLOG

Category: Weekly Threat Briefing

Weekly Threat Briefing

WTB: New Banking Trojan IcedID Discovered

The intelligence in this week’s iteration discuss the following threats: Business Email Compromise, Financial theft, Malspam, Phishing, Ransomware, Threat group, Trojan, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending Threats ...
Read More


Weekly Threat Briefing

WTB: Over A Million Android Users Fooled by Fake WhatsApp App in Official Google Play Store

The intelligence in this week’s iteration discuss the following threats: Botnet, Data leak, Email account compromise, Malicious application, Malspam, Phishing, Ransomware, RAT, Spear phishing, Trojan, Targeted attacks, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs...
Read More


Weekly Threat Briefing

WTB: LokiBot Android Banking Trojan Turns Into Ransomware When You Try to Remove It

This section listed below contains summaries on various threat intelligence stories that occurred during the past week. The intelligence in this week's iteration discuss the following threats: Botnet, Exploit kit, Malicious Applications, Malspam, Phishing, Ransomware, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and...
Read More


Weekly Threat Briefing

WTB: Advanced Persistent Threat Activity Targeting Energy and Critical Infrastructure Sectors

The intelligence in this week’s iteration discuss the following threats: APT, Malspam, Malvertising, Malware, Phishing, Targeted attacks, Ransomware, and Underground markets. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsOSX/Proton...
Read More


Weekly Threat Briefing

WTB: WPA2 Security Flaw Puts Almost Every Wi-Fi Device at Risk of Hijack, Eavesdropping

The intelligence in this week’s iteration discuss the following threats: Data breach, Malware, Malvertising, Phishing, RAT, Support scam, Threat group, Vulnerabilities, Wi-Fi, and Zero-day. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending...
Read More


Weekly Threat Briefing

WTB: Every Single Yahoo Account Was Hacked 3 Billion In All

The intelligence in this week’s iteration discuss the following threats: Account compromise, Botnet, Data breach, Data theft, Malspam, Phishing, Ransomware, Targeted attacks, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending...
Read More


Weekly Threat Briefing

WTB: Flawed Apple Mac Firmware Updates May Leave Them Vulnerable to Attack

The intelligence in this week’s iteration discuss the following threats: Data breach, Data theft, Malspam, Phishing, Targeted attacks, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsFlawed Apple Mac...
Read More


Weekly Threat Briefing

WTB: Oracle Patches Apache Vulnerabilities

The intelligence in this week's iteration discuss the following threats: APT, Banking trojan, Data breach, Malspam, Mobile, Ransomware, Spear phishing, Typosquatting, and Vulnerability. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsOracle...
Read More


Weekly Threat Briefing

WTB: CCleanup, A Vast Number of Machines at Risk

The intelligence in this week’s iteration discuss the following threats: Adware, Compromise, Data Breach, Malspam, Malicious Plugin, Phishing, and Vulnerability. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsCCleanup: A Vast...
Read More


Weekly Threat Briefing

WTB: Equifax Breach: Sensitive Info, SSNs of 44% of U.S. Consumers Accessed by Attackers

The intelligence in this week’s iteration discuss the following threats: APT, Banking trojan, Data breach, Malspam, Misconfigured database, Phishing, and Vulnerability. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsAdmin Accounts...
Read More


Weekly Threat Briefing

WTB: US Government Site Was Hosting Ransomware

The intelligence in this week’s iteration discuss the following threats: Bitpaymer, Cobian RAT, KHRAT, Locky Ransomware, Malspam, Sarahah, Turla and WireX. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsUS Government...
Read More


Malware Weekly Threat Briefing

WTB: US Arrests Chinese Man Involved With Sakula Malware Used in OPM and Anthem Hacks

The intelligence in this week’s iteration discuss the following threats: APTs, Cybercriminals, Data leaks, Exploit kits, Malspam, Malware, Mobile, Ransomware, Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsUS Arrests...
Read More


Weekly Threat Briefing

WTB: Cryptocurrency Miner Uses WMI and EternalBlue To Spread Filelessly

Trending ThreatsThe intelligence in this week’s iteration discuss the following threats: APT, Exploit Kit, Malspam, Phishing, Ransomware, Underground Markets, Vulnerabilities, and Zero-days. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Cryptocurrency Miner...
Read More


Weekly Threat Briefing

WTB: Malspam Continues to Push Trickbot Banking Trojan

The intelligence in this week’s iteration discuss the following threats: Adware, APT, Data breach, Data leak, Malspam, Phishing, and Spear phishing. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsCVE-2017-0199:...
Read More


Weekly Threat Briefing

WTB: WannaCry Hero Arrested, One of Two Charged with Distribution of Kronos Malware

The intelligence in this week’s iteration discuss the following threats: APT, Data Breach, Exploit Kits, Malspam, Mobile, Phishing, Ransomware, and Spyware. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsCampaign Leads...
Read More


Weekly Threat Briefing

WTB: Wallet-snatch hack: ApplePay ‘vulnerable to attack’, claim researchers

The intelligence in this week’s iteration discuss the following threats: Android Trojans, ApplePay, CowerSnail, Lipizzan, Ransomware, UniCredit Breach, Ursnif, Veritaseum, and Windows Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending Threats ...
Read More


Weekly Threat Briefing

WTB: Kansas Data Breach Exposes More Than 5 Million Social Security Numbers

The intelligence in this week’s iteration discuss the following threats: Adware, Banking Trojans, Breaches, Internet of Things, NukeBot, SambaCry, Stantinko and TrickBot. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.Trending ThreatsKansas...
Read More


Weekly Threat Briefing

WTB: New “WPSetup” Attack Targets Fresh WordPress Installs

The intelligence in this week’s iteration discuss the following threats: Adobe Patches, Android Malware, Cloud Leaks, Point-of-Sale, Ransomware, Remote Access Trojan, and Windows Protocol Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity. ...
Read More


Weekly Threat Briefing

WTB: Hard Rock, Loews Hotels Admit Data Breach

The intelligence in this week’s iteration discuss the following threats: Credit Card theft, Distributed Denial-of-Service, Mobile malware, Payment System breach, Point-of-Sale, Ransomware, Remote Access Trojan. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity. ...
Read More


Weekly Threat Briefing

WTB: More Security Firms Confirm NotPetya Shoddy Code Is Making Recovery Impossible

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...
Read More


Get the latest threat intelligence news in your email.