Threat Hunter TeamSymantecPosted: 20 Jun, 20245 Min ReadThreat IntelligenceSustained Campaign Using Chinese Espionage Tools Targets TelcosAttackers were heavily focused on telecoms operators in a single Asian country.Sustained Campaign Using Chinese Espionage Tools Targets Telcos
Nguyen Hoang GiangSenior Threat Analysis EngineerPosted: 25 Jul, 20243 Min ReadGrowing Number of Threats Leveraging AIThreat actors utilizing Large Language Model (LLM) AIs to generate code used in malware campaigns.Growing Number of Threats Leveraging AI
Threat Hunter TeamSymantecPosted: 23 Jul, 20246 Min ReadDaggerfly: Espionage Group Makes Major Update to ToolsetAPT group appears to be using a shared framework to create Windows, Linux, macOS, and Android threats.Daggerfly: Espionage Group Makes Major Update to Toolset
Threat Hunter TeamSymantecPosted: 11 Jul, 20245 Min ReadRansomware: Activity Levels Remain High Despite DisruptionActivity levels dipped slightly in the first quarter of 2024 as two major ransomware operations were the targets of law enforcement operations. Ransomware: Activity Levels Remain High Despite Disruption
Threat Hunter TeamSymantecPosted: 20 Jun, 20245 Min ReadSustained Campaign Using Chinese Espionage Tools Targets TelcosAttackers were heavily focused on telecoms operators in a single Asian country.Sustained Campaign Using Chinese Espionage Tools Targets Telcos
Threat Hunter TeamSymantecPosted: 12 Jun, 20243 Min ReadRansomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-daySome evidence to suggest that attackers linked to Black Basta compiled CVE-2024-26169 exploit prior to patching.Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day