Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

cybersecurity threat landscape

  • Home
  • cybersecurity threat landscape
From Security Week – Ransomware Groups Increasingly Adopting EDR Killer Tools
Posted inNews

From Security Week – Ransomware Groups Increasingly Adopting EDR Killer Tools

[[{"value":"ESET uncovers a link between RansomHub, Play, Medusa, and BianLian ransomware gangs as more groups adopt tools to disable EDR software. The post Ransomware Groups Increasingly Adopting EDR Killer Tools…
Posted by shaikh Saqib March 27, 2025
From Cybersecurity Help – A new PolarEdge botnet infected 2K+ devices over past two years
Posted inVulnerabilities

From Cybersecurity Help – A new PolarEdge botnet infected 2K+ devices over past two years

The botnet exploits a vulnerability, which affects several models of Cisco Small Business Routers.  ​ Read More  ​ 
Posted by shaikh Saqib February 25, 2025
From Security Week – Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition
Posted inNews

From Security Week – Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition

[[{"value":"In the latest edition of “Rising Tides” we talk with Lesley Carhart, Technical Director of Incident Response at Dragos. The post Rising Tides: Lesley Carhart on Bridging Enterprise Security and…
Posted by shaikh Saqib February 14, 2025
From Cybersecurity Help – Sandworm APT targets Ukraine with trojanized Microsoft KMS activation tools
Posted inVulnerabilities

From Cybersecurity Help – Sandworm APT targets Ukraine with trojanized Microsoft KMS activation tools

The attackers utilized a BACKORDER loader to deploy DarkCrystal RAT.  ​ Read More  ​ 
Posted by shaikh Saqib February 12, 2025
From Cybersecurity Help – North Korean Kimsuky adopted a new tactic to infiltrate targets
Posted inVulnerabilities

From Cybersecurity Help – North Korean Kimsuky adopted a new tactic to infiltrate targets

The new tactic involves the threat actor tricking individuals into executing PowerShell commands as administrators.  ​ Read More  ​ 
Posted by shaikh Saqib February 12, 2025
From Cyber Security News – NetSupport RAT Grant Attackers Full Access To Victims Systems
Posted inNews

From Cyber Security News – NetSupport RAT Grant Attackers Full Access To Victims Systems

 Cybersecurity experts have observed a significant increase in the use of the NetSupport Remote Access Trojan (RAT) in recent months, a malicious tool that allows attackers to gain full control…
Posted by shaikh Saqib February 10, 2025

Latest Posts

  • From Cyber Security News – Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager CredentialsMay 8, 2026
  • From Graham Cluley – One in eight UK workers has sold their company passwords, and bosses think it’s fineMay 8, 2026
  • From The Hacker News – Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store DownloadsMay 8, 2026
  • From Graham Cluley – Inside Department 4: Russia’s secret school for hackersMay 8, 2026
  • From Security Week – In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerMay 8, 2026
Total Visitors
1501662

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top