Threat Hunter TeamSymantecPosted: 24 Jan, 20244 Min ReadThreat IntelligenceThe 2024 Ransomware Threat LandscapeUnderstanding attackers' TTPs is key to stopping attacks before ransomware is deployed.The 2024 Ransomware Threat Landscape
Threat Hunter TeamSymantecPosted: 2 May, 20245 Min ReadGraph: Growing number of threats leveraging Microsoft APIGraph API is often used for inconspicuous communications to cloud-based command-and-control servers.Graph: Growing number of threats leveraging Microsoft API
Threat Hunter TeamSymantecPosted: 12 Mar, 20244 Min ReadRansomware: Attacks Continue to Rise as Operators Adapt to DisruptionAvailable evidence suggests vulnerability exploitation has replaced botnets as a prime infection vector.Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption
Threat Hunter TeamSymantecPosted: 6 Mar, 20248 Min ReadData Exfiltration: Increasing Number of Tools Leveraged by Ransomware AttackersVast majority of tools are dual-use, legitimate software installed by attackers for malicious purposes.Data Exfiltration: Increasing Number of Tools Leveraged by Ransomware Attackers
Threat Hunter TeamSymantecPosted: 16 Feb, 20244 Min ReadAlpha Ransomware Emerges From NetWalker AshesEmergent ransomware operation has strong links with shuttered NetWalker.Alpha Ransomware Emerges From NetWalker Ashes
Threat Hunter TeamSymantecPosted: 24 Jan, 20244 Min ReadThe 2024 Ransomware Threat LandscapeUnderstanding attackers' TTPs is key to stopping attacks before ransomware is deployed.The 2024 Ransomware Threat Landscape