Doing our part to keep you informed on the latest cybersecurity threats this week. 👇 https://bit.ly/46JIoxB 1️⃣ Threat Profile: Sandworm Team Threat level: High 🟥 The Sandworm Team is a highly sophisticated cyber-espionage and cyber-warfare group believed to be associated with the Russian military intelligence agency GRU. 2️⃣ Threat Actors Continue To Take Advantage Of LockBit Ransomware Builders Threat level: Medium 🟧 Emerging variants of LockBit ransomware, such as Brain Cipher Ransomware and Nullbudge Lock, provide links to Tor-accessible web interfaces for ransom negotiations. 3️⃣ Threat Profile: Kimsuky Threat level: Medium 🟧 This group actor, believed to be sponsored by the North Korean regime, seeks to focus on espionage and TTPs employed by the group through phishing tactics. 4️⃣ Threat Profile: Latrodectus Threat level: Medium 🟧 Latrodectus is a downloader malware possibly derived from the same authors as IcedID, aiming to deploy further malware, such as Danabot or IcedID. It can run processes or existing files from the compromised system. 5️⃣ Multiple Attack Chains Distribute Fickle Stealer Threat level: Medium 🟧 Fickle Stealer is a Rust-based malware distributed via various methods, including VBA droppers, downloaders, and executable downloaders. 6️⃣ Boolka Threat Actor Using Formstealing JavaScript To Capture Sensitive Data Threat level: Medium 🟧 A landing page designed to distribute the BManager modular trojan uses tactics suggesting the script is designed for data exfiltration, likely capturing sensitive information. 7️⃣ Russia-Linked CopyCop Targets Political Leaders To Influence Elections Via Mis-Information Campaigns Threat level: Medium 🟧 Copycop is a Russian government-aligned influence network using fake websites and generative AI for extensive influence operations. 8️⃣ RisePro Information Stealer Technical Analysis Threat level: Medium 🟧 RisePro is a versatile information-stealing malware developed in C++, first identified in December 2022. 9️⃣ ChamelGang Attacking Critical Infrastructure with Ransomware Threat level: Low 🟨 Threat actors in cyber espionage are increasingly using ransomware in their operations. A cluster of attacks using BestCrypt and BitLocker has particularly affected the U.S. manufacturing sector. 🔟 The Gamaredon Group Carries Out Attacks Against Ukraine Using Malicious 1px Image Files Threat level: Low 🟨 The Gamaredon Group, also known as UNC530, Armageddon, and Shuckworm, is believed to be responsible for a recent attack campaign targeting Ukraine.
Trellix
Computer and Network Security
Plano, Texas 460,347 followers
The Future of XDR. We Bring Security to Life.
About us
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix’s security experts, along with an extensive partner ecosystem, accelerate technology innovation through machine learning and automation to empower over 40,000 business and government customers. More at https://trellix.com.
- Website
-
https://www.trellix.com
External link for Trellix
- Industry
- Computer and Network Security
- Company size
- 1,001-5,000 employees
- Headquarters
- Plano, Texas
- Type
- Privately Held
- Founded
- 2022
Locations
-
Primary
Plano, Texas, US
Employees at Trellix
Updates
-
Operation Morpheus is making great strides in stopping the spread of illegal versions of the Cobalt Strike penetration tool, and #TeamTrellix shared threat intelligence to support the takedown of 593 IP addresses. This is #SoulfulWork in action. Read more. https://bit.ly/4eWiITP
-
We are proud to partner with innovative cybersecurity vendors whose products enhance the core functionality of our portfolio. With the Trellix Security Innovation Alliance, you can take full advantage of our open, collaborative approach. Learn more about becoming a partner. https://bit.ly/3xb5r8C
-
Discover how Trellix Email Security fortifies your most vulnerable attack vector. Click through our self-guided tour to: 🔎 Explore the Email Cloud Security dashboard 📧 Uncover techniques to detect and stop email impersonation ransomware attacks 🚫 See how to pull a malicious email from a user’s inbox and more ➡️ https://bit.ly/4cCXiJu
-
Picture this: One minute, you’re checking your email, and the next, your files become encrypted, leaving a ransom note text file in every folder. Aishwarya Gentyal from our Trellix Advanced Research Center shares insight into one of the latest ransomware campaigns targeting high-profile victims. Check out the findings here. Stay protected: https://bit.ly/3xPEWGo
-
🚨 Trellix Advanced Research Center’s extensive analysis and threat intelligence aided global law enforcement in the dismantlement of nearly 600 servers hosting illegal versions of Cobalt Strike. Read more on the takedown from Forbes.
The Wiretap: This Company Raised $21 Million To Build An AI Assistant For Data Breach Investigations
social-www.forbes.com
-
No Thursday night plans? Why not learn a little something? 🍿📺 Grab your favorite snack, kick back, and enjoy the on-demand Trellix TechInsight Quarterly: Product Showcase. Not only will you come to understand the shift to modern endpoint security, but you'll also see our solutions in action with expert-led demos. https://bit.ly/3OZPok7
-
Across an array of customer feedback on UserEvidence, one theme consistently emerges: ✨The #TeamTrellix difference. ✨ We don't just meet industry standards; we strive to set new ones. From superior product capabilities to unmatched customer support teams, we outshine other industry players. Customers highlight how our products merge innovation with a user-friendly interface. Ready to see what sets us apart? Learn more and experience the Trellix difference first-hand. ➡️ https://bit.ly/4cD7BgY
-
Cybersecurity has become a bedrock of trust in our increasingly interconnected world. How does #TeamTrellix maintain this trust, improve security operations, and manage emerging risks? CEO Bryan Palma shares in the interview from Davos at the World Economic Forum's Annual Meeting. https://reut.rs/3SGfpGb