Incidents, attributions, and exploitation techniques for path traversal flaw in Fortinet FortiOS SSL VPN devices
2020-12-28
Incidents, attributions, and exploitation techniques for path traversal flaw in Fortinet FortiOS SSL VPN devices

First published on 16 Dec 2020 A hacker has published a list of one-line exploits that can exfiltrate

Hackers Abuse Microsoft Teams’ Vulnerabilities
2020-12-24
Hackers Abuse Microsoft Teams’ Vulnerabilities

Microsoft Teams could be targeted by suspected threat actors as they have been observed manipulating

N. Korean Hacking Group, Kimsuky, Escalates Attacks
2020-12-16
N. Korean Hacking Group, Kimsuky, Escalates Attacks

Kimsuky (aka Velvet Chollima, Black Banshee, and Thallium) is a known N. Korean state-sponsored threat

Understanding Open Proxies and Cyberattacks
2020-11-09
Understanding Open Proxies and Cyberattacks

CYFIRMA research first alerted clients on the increase in open proxy usage as the attack method by

Out of Band Notification: Next Emotet Campaign
2020-01-06
Out of Band Notification: Next Emotet Campaign

As of December 25, CYFIRMA Threat Intelligence team had gathered indicators suggesting that a new