Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

command-and-control infrastructure

  • Home
  • command-and-control infrastructure
From Cyber Security News – Lazarus Group is No Longer Consider a Single APT Group, But Collection of Many Sub Groups
Posted inNews

From Cyber Security News – Lazarus Group is No Longer Consider a Single APT Group, But Collection of Many Sub Groups

 The cybersecurity landscape is witnessing a growing complexity in the attribution of Advanced Persistent Threat (APT) actors, particularly the North Korean-linked Lazarus group. Once considered a singular entity, Lazarus has…
Posted by shaikh Saqib April 1, 2025
From Cyber Security News – Hackers Leveraging Business Relationship To Attack Arab Emirates Aviation Sector
Posted inNews

From Cyber Security News – Hackers Leveraging Business Relationship To Attack Arab Emirates Aviation Sector

 Security researchers at Proofpoint have uncovered a sophisticated cyber espionage campaign targeting aviation and satellite communications organizations in the United Arab Emirates. The campaign, attributed to a threat actor tracked…
Posted by shaikh Saqib March 5, 2025
From Cyber Security News – LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users
Posted inNews

From Cyber Security News – LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users

 The LightSpy advanced persistent threat (APT) group has significantly upgraded its surveillance capabilities with a 100+ command framework targeting Android, iOS, Windows, macOS, and Linux systems, according to new infrastructure…
Posted by shaikh Saqib February 25, 2025
From Cyber Security News – Researchers Unveiled Tactics, Techniques, and Procedures Used by North Korean Hackers
Posted inNews

From Cyber Security News – Researchers Unveiled Tactics, Techniques, and Procedures Used by North Korean Hackers

 Researchers have shed light recently on the sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean hackers. This comprehensive analysis, spanning nearly three years, focuses on targeted digital threats…
Posted by shaikh Saqib February 11, 2025

Latest Posts

  • From Dark Reading – Has CISA Finally Found Its New Leader in Tom Parker?May 7, 2026
  • From Cyber Security News – New Ivanti EPMM 0-Day Vulnerability Actively Exploited in AttacksMay 7, 2026
  • From Cyber Security News – CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain Root AccessMay 7, 2026
  • From Cyber Security News – New Cisco Network Vulnerability Let Remote Attacker Cause DoS AttackMay 7, 2026
  • From Security Week – Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingMay 7, 2026
Total Visitors
1495272

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top