Attack Techniques
Brought to you by
Cynet’s CyOps team
Get the latest security updates from our 24/7 MDR team
Under attack?Network Attacks and Exfiltration
Credential Access & Data Collection
Initial Access and Fileless Attacks
Ransomware Threat Reports
- Cynet Detection Report: Maze Ransomware
- Cynet Detection Report: Ragnar Locker Ransomware
- THREAT REPORT - FTCODE
- NetWalker Ransomware Report
- Ransomware Attacks in Belgium - Analysis & Protection
- Threat Detection Report: Wastedlocker Ransomware
- Cynet Ransomware Report: Mespinoza
- Kaseya Supply-Chain Attack
- Malware Evolution - Analyzing LockBit 2.0
Vulnerabilities
- Cybersecurity Explained: Defending Against Modern Cyber Threats
- Zerologon Vulnerability: Analysis and Detection Tools
- CyOps Important Security Update – ProxyShell
- Microsoft MSHTML Remote Code Execution Vulnerability
- Recent Microsoft Vulnerabilities Overview
- Log4Shell Explained
- Threats Looming Over the Horizon
Persistence
Evasion techniques
Threat Reports
- nJRAT Report: Bladabindi
- Threat Research Report: Clipbanker - 13 Second Attack
- Emotet vs Trump – Deep Dive Analysis of a Killer Info-Stealer
- When a Sunburst Turns Supernova – A Recent Solarigate Development
- SUNBURST Backdoor C2 Communication Protocol
- Here We Go Again – A New Emotet banking trojan Wave Observed by Cynet
- Cyber Attacks Overview 2020
- China Chopper Observed in Recent MS Exchange Server Attacks
- CYNET VS. HAFNIUM
- Shelob Moonlight – Spinning a Larger Web
- CyOps Important Security Update: Campaign Targeting Italian Organizations & Entities
- You'll See it Only When it Strikes
- A Virtual Baffle to Battle SquirrelWaffle
- Quakbot Strikes with QuakNightmare Exploitation
- DLLs and Ways They Can Hurt Us
- RedLine is on track, Next stop - Your credentials
- New Wave of Emotet - When Project X Turns Into Y