Ransomware Group Uses Recycled Code

Ransomware Group Uses Recycled Code

A new ransomware group, called Monti, appears to have used leaked Conti code, TTPs, and infrastructure approaches to launch its own ransomware campaign. Analysts have discovered a ransomware campaign from a new group called “Monti,” which relies almost...
OpenCTI upgrade: data sharing capabilities

OpenCTI upgrade: data sharing capabilities

The figure below represents the current landscape of OpenCTI sharing capabilities. OpenCTI data sharing landscape   What’s new in OpenCTI 5.3.x?    Menu reorganization As data sharing features are increasing, we refactored a bit the menu to group these...
What a Successful Threat-Hunting Program Looks Like?

What a Successful Threat-Hunting Program Looks Like?

Threat hunters can help build defenses as they work with offensive security teams to identify potential threats and build stronger threat barriers. Over the last few years, an influx of high-profile industry security issues (PDF) have placed offensive tactics among...

Pin It on Pinterest