
Browse Blackpoint’s Threat Intel


Abyss Ransomware
Threat Intel
Lynx Ransomware
Threat Intel
SOC Insights: Pre-Ransomware Threats and Obfuscated PowerShell
Threat Intel
DragonForce Ransomware
Threat Intel
SOC Insights: Lumma Stealer and DarkGate Malware spanning over 772 incidents
Threat Intel
Alphv Ransomware
Threat Intel
A Deep Dive into Recent Obfuscated PowerShell, Zoho Assist, and NetSupport RAT Attacks
Threat Intel
BianLian Ransomware
Threat Intel
Akira Ransomware
Threat Intel
Hunters International Ransomware
Threat Intel
Mitigation Lessons from 598 Incident Responses: DarkGate Malware, LotL Techniques, and Rclone Attacks
Threat Intel
Trojan Malware, Powershell Attacks, and Credential-Stealing
Threat Intel
Scheduled Tasks, AnyDesk, and VPN Compromise
Threat Intel
Rust-Based Ransomware is Advancing on MSPs
Cybersecurity
Greenshot, AnyDesk, TeamViewer, Classroom Spy Pro, ProcDump, and Mimikatz
Cybersecurity
Alert: Active Exploit of Critical SonicWall CVE via SSLVPN for Initial Access
Cybersecurity
Alert: New Critical Veeam CVEs Expose Backups to Ransomware Gangs
Cybersecurity
Azorult Stealer, AsyncRAT, and Trojan Malware
Cybersecurity
Qilin Ransomware
Cybersecurity
Ransomhub Ransomware
Cybersecurity
AsyncRAT, Lumma Stealer, and Ransomhub Ransomware
Cybersecurity
Modern Cyber Threat Intelligence Conversation with SecurityGuyTV
Cybersecurity
Raspberry Robin, ScreenConnect, AteraAgent, RDP, whoami, & SharpShares
Cybersecurity
Vanilla Tempest, Oyster Backdoor, NetSupport RAT, and Unknown Infostealers
Cybersecurity
SYS01 Stealer, Ratty Rat, and AsyncRAT
Cybersecurity
CrowdStrike BSOD Help, Advanced IP Scanner, TeamViewer, NetSupport RAT, and AsyncRAT
Cybersecurity
LuminousMoth, Tnega Malware, Advanced IP Scanner, RDP Abuse, and SolarMarker
Threat Intel
Brute Ratel, Advanced IP Scanner, and NetSupport RAT
Threat Intel
Beyond Phishing: Three More Ways Adversaries Complicate Initial Intrusion
Thought Leadership
AsyncRAT, NetSupport RAT, and VssAdmin Abuse for Shadow Copy Deletion
Company
Potential BianLian Ransomware, TeamViewer, and BitLocker
Company
Netscan.exe, Mimikatz, Angry IP Scanner, and RMM Tool Abuse
Threat Intel
ChromeLoader, Malicious “Innovation Systems” Task, and RDP Abuse
Company
MITRE ATT&CK T1091: Replication Through Removable Media
Threat Intel
ChromeLoader, Telegram, RustDesk, and Tailscale
Company
FIN7 Threat Group
Threat Intel
NTLM Credential Theft and Gootloader
Company
Devos Ransomware, RDP, and NetSupport RAT
Company
Vidar Stealer
Cybersecurity
Sangria Tempest, SocGholish, and BITS Download
Threat Intel
SocGholish Loader Malware
Cybersecurity
RATs, Malicious PC Hunter, AnyDesk Abuse, and Malicious PowerShell Scripts
Threat Intel
FortiClient EMS, Ivanti, and Palo Alto
Threat Intel
WebBrowserPassView, Process Hollowing, and LotL Tool Abuse
Threat Intel
DarkGate, SolarMarker, and Malicious PowerShell Commands
Threat Intel
Understanding Penetration Testing: Beyond Vulnerability Scans
Tech Center
Mimikatz, LaZagne, CredentialsFileView, Raspberry Robin, and Scheduled Tasks Abuse: The Blackpoint SOC’s Week in Review for April 4, 2024
Threat Intel
FortiClientEMS Vulnerability, Akira Ransomware, and Gootloader: The Blackpoint SOC’s Week in Review for March 29, 2024
Threat Intel
Vulnerable RMM Tools and Vulnerable Industries: Why Vigilance is Key
Threat Intel
Annual Threat Report Webinar 2024
Threat Intel
This Week in Review: AnyDesk, TeamViewer, QuickBooks, and IsErIk Malware
Threat Intel
This Week in Review: Ligolo Tunneler, Neshta, Purple Fox, and More
Threat Intel
Blackpoint Cyber Annual Threat Report 2024
Threat Intel
This Week in Review: ScreenConnect “Updates,” Vidar Malware, & Malicious ZIP Files
Threat Intel
Medusa and Midnight Blizzard: How Strong Passwords & MFA Still Help
Threat Intel
This Week in Review: ScreenConnect, QuickBooks, Teamviewer, & More
Threat Intel
Don’t arm the enemy. Safeguard your allies
Threat Intel
Breaking Through the Screen
Threat Intel
Don’t arm the enemy. Safeguard your allies.
Thought Leadership
ConnectWise ScreenConnect Vulnerabilities
Threat Intel
Demystifying the Dark Web
Threat Intel
008: Shedding Light on the Dark Web
People & Culture
Blackpoint SOC Protects Against Recent AnyDesk Compromise
Threat Intel
The Mother of All Breaches…or Is It?
Threat Intel
The 5 Most Dominant Threat Actors of 2023
Threat Intel
BlackCat Ransomware Group Taken Down, but Ransomware Threats Persist
Threat Intel
APG Threat Digest: 22nd Edition
Threat Intel
Blackpoint’s 2024 Cyberthreat Predictions
Threat Intel
APG Threat Digest: 21st Edition
Threat Intel
APG Threat Digest: 20th Edition
Threat Intel
APG Threat Digest: 19th Edition
Threat Intel
APG Threat Digest: 18th Edition
Threat Intel
Top Data Breaches in the Last Year
People & Culture
APG Threat Digest: 17th Edition
Threat Intel
Strengthening Google Workspace Security
Tech Center
APG Threat Digest: 16th Edition
Threat Intel
APG Threat Digest: 15th Edition
Threat Intel
Top Five Cloud Security Threats
Tech Center
APG Threat Digest: 14th Edition
Threat Intel
Scan with Caution: The Light and Dark Sides of QR Codes
Threat Intel
APG Threat Digest: 13th Edition
Threat Intel
FIN8 Strikes Again: Advanced Tactics in Recent Cyber Assault
Threat Intel
APG Threat Digest: 12th Edition
Threat Intel
Patch It Up: WS_FTP Server’s Unplanned Fixes
Threat Intel
Shedding Light on Cyberthreats: APT34’s Menorah Malware
Threat Intel
From Chrome to Everywhere: The Ever-Expanding CVE-2023-4863
Threat Intel
Unmasking Ransomed.vc: The New Kid on the Cyber Block
Threat Intel
FBI and CISA Team Up to Combat Snatch Ransomware
Threat Intel
When Vulnerabilities Collide: Juniper’s Critical Collision
Threat Intel
Viva Las Vulnerabilities: MGM Hit by ALPHV Ransomware
Threat Intel
Azure HDInsight Battles Against XSS Vulnerabilities
Threat Intel
Top Threat Actor Tactics You Should Be Aware Of: Understanding Cyberthreats in the Digital Age
Thought Leadership
Cisco ASA SSL VPN Appliances Under Fire
Threat Intel
Unmasking the Acquired Key: Microsoft and Storm-0558’s Tale
Threat Intel
Blackpoint Stops Microsoft Intune Abuse in Under One Minute
Threat Intel
Excel-lent Phishing Campaign with Agent Tesla Variant
Threat Intel
Put on Your Cyber Gloves: BLISTER Loader Resurfaced
Threat Intel
Okta’s Social Engineering Escalations
Threat Intel
MalDoc in PDF: The Word Doc and PDF Team Up
Threat Intel
Qakbot’s Quack Attack Comes to an End
Threat Intel
Proxy Party of Peril: Malware and Proxy Team Up
Threat Intel
China’s High-Stakes Cyber Shenanigans: Cert Theft & DLL Hijacking
Threat Intel
Meet Rhysida: The ‘Helpful’ Cybersecurity Team with a Dark Side
Threat Intel
Midnight Blizzard Mixes Up Microsoft 365
Threat Intel
The SSM Agent’s Secret Identity: Unmasking the RAT Within
Threat Intel
Pebbles Aren’t Alone: The Fruity Find Making Waves in Cybersecurity
Threat Intel
Abusing the Microsoft “search”/”search-ms” URI Protocol
Threat Intel
Nitrogen’s Malvertising Mayhem: When Ads Go Rogue!
Threat Intel
MikroTik Vulnerability Emerges from the Past
Threat Intel
Apple Combats Zero-Day Zero-Click Campaign
Threat Intel
Redis on the Run: P2PInfect Worm Attacks
Threat Intel
Identity Crisis in the Cloud: Storm-0558 and the Forged Access Key
Threat Intel
FIN8’s Latest Remix: Sardonic with Noberus
Threat Intel
WormGPT: The New Bait in Phishing and BEC Attacks
Threat Intel
Exploding Back into the Picture: TeamTNT Makes a Comeback
Threat Intel
SocGholish: Haunting the Digital Realm for Over Five Years
Threat Intel
Zero-Day Fireworks: Microsoft’s July Patch Party
Threat Intel
A Glimpse at Ransomware Roundup: APG Explores the Latest Threat Actors and Variants
Threat Intel
Sign Here, Malware There: Forged Kernel-Mode Driver Signatures
Threat Intel
An Update on the MOVEit Vulnerability
Threat Intel
Blackpoint Command Session 15: Building a Threat-Informed Security Stack that Sells
Thought Leadership
Blackpoint Cyber Detains Qakbot Information-Stealing Malware
Tech Center
A Deep Dive Into the 3CXDesktopApp Security Vulnerability
Threat Intel
2023 Cyberthreats to Watch Out For
Threat Intel
With .one Foot in the Door
Threat Intel
ChileLocker’s Chilling Mistakes
Threat Intel
In the Chaos of Lorenz, APG sORted It Out
Threat Intel
IT Tools, Infostealers, and Account Compromise – Blackpoint’s Threat Operations Year in Review
Thought Leadership
Nation States’ Impact on Cyber Insurance
Thought Leadership
But is MFA Enough? Unpacking Business Email Compromise
Tech Center
Unearthing Project Relic
Thought Leadership
Blackpoint Responds to Business Email Compromise
Tech Center
Ratting Out Arechclient2
Threat Intel
Blackpoint Overwatch: Executive Summary of Ratting Out Arechclient2
Threat Intel
Emerging Threat Briefing
Threat Intel
Episode 16: Lessons Learned from Zero-Day Attacks with APG
Thought Leadership
Combatting Industry Myths with MDR Intel
Thought Leadership
Episode 14: New Tactics and Techniques From the Bad Guys
Thought Leadership
Tech Tuesday: Eye Spy – The Dangers of Legal Malware
Threat Intel
It’s Great, Until It’s Not: Four Security Time Bombs
Threat Intel
Blackpoint ReCON 2022 On-Demand
Company
Episode 11: Password Spraying, Email Impersonation, and Disinformation with David Rushmer
Company
5 Reasons You Won’t Want to Miss ReCON 2022
Company
Episode 07: Breaking Down HAFNIUM, Staying Curious, and Advice for Budding Security Professionals
Tech Center
Malware on Trial
Threat Intel
Tarrask-ing for Trouble
Threat Intel
Vulnerabilities Uncovered in SonicWall SMA Appliances
Threat Intel
Apache Log4j RCE Vulnerability
Threat Intel
Critical Microsoft Print Spooler Service Vulnerability Exposed
Threat Intel
Zero-Day Exploit Found in Kaseya VSA
Threat Intel
Ransomware attack shuts down critical US pipeline
Threat Intel
Threat Actors Exploit SonicWall Email Security Vulnerabilities
Threat Intel
Significant Increase in Cyber Attacks Targeting Accounting Firms
Threat Intel
HAFNIUM Hackers Attack Microsoft Exchange Servers using Multiple Zero-day Vulnerabilities
Threat Intel
Florida Water Treatment Center Hacked
Threat Intel
SonicWall Hacked Using Zero-day vulnerabilities in its VPN Products
Threat Intel
FBI Warns of Increasing Ragnar Locker Ransomware Attacks
Threat Intel
Password Exposure for Fortinet Devices Vulnerable to CVE-2018-13379
Threat Intel
Critical Vulnerability for SonicWall VPN (CVE-2020-5135)
Threat Intel
Critical Windows “MS-NRPC” Exploit ZeroLogon (CVE-2020-1472)
Threat Intel
Passwords leaked for Enterprise VPN (CVE-2019-11510)
Threat Intel
Critical Microsoft DNS Server Vulnerability (CVE-2020-1350)
Threat Intel
VMware vCenter Server Security Vulnerability (CVE-2020-3952)
Threat Intel
CISA Warns of Nation-State Attacks – Are You Prepared?
Threat Intel
WannaCry Déjà Vu
Threat Intel
Spear Phishing Campaign Stopped by Blackpoint MDR
Threat Intel
Olympic Destroyer Hack: How We Would’ve Stopped It
Threat IntelStay in the Know
They say that knowing is half the battle. Get regular updates on all the latest in cybersecurity including threat intel, new Blackpoint capabilities, upcoming events, and more.