Threat Hunter TeamSymantecPosted: 24 Jan, 20244 Min ReadThreat IntelligenceThe 2024 Ransomware Threat LandscapeUnderstanding attackers' TTPs is key to stopping attacks before ransomware is deployed.The 2024 Ransomware Threat Landscape
Threat Hunter TeamSymantecPosted: 12 Mar, 20244 Min ReadRansomware: Attacks Continue to Rise as Operators Adapt to DisruptionAvailable evidence suggests vulnerability exploitation has replaced botnets as a prime infection vector.Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption
Threat Hunter TeamSymantecPosted: 6 Mar, 20248 Min ReadData Exfiltration: Increasing Number of Tools Leveraged by Ransomware AttackersVast majority of tools are dual-use, legitimate software installed by attackers for malicious purposes.Data Exfiltration: Increasing Number of Tools Leveraged by Ransomware Attackers
Threat Hunter TeamSymantecPosted: 16 Feb, 20244 Min ReadAlpha Ransomware Emerges From NetWalker AshesEmergent ransomware operation has strong links with shuttered NetWalker.Alpha Ransomware Emerges From NetWalker Ashes
Threat Hunter TeamSymantecPosted: 24 Jan, 20244 Min ReadThe 2024 Ransomware Threat LandscapeUnderstanding attackers' TTPs is key to stopping attacks before ransomware is deployed.The 2024 Ransomware Threat Landscape
Threat Hunter TeamSymantecPosted: 19 Dec, 20237 Min ReadSeedworm: Iranian Hackers Target Telecoms Orgs in North and East AfricaMuddyC2Go framework and custom keylogger used in attack campaign.Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa