Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of April 2023. This cybercrime threat landscape analysis will particularily concentrate on : Decrease of ransomware attacks between March &...
Cette année encore, deux de nos collaborateurs Intrinsec étaient présents lors du Security Day de l’école ESGI pour porter les couleurs de l’entreprise avec l’animation de deux présentations sur le thème de la sécurité en milieu Active Directory avec un focus sur les...
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of March 2023. This threat landscape analysis will particularily concentrate on : Top 10 most active ransomware operators in the last three...
Our 2022 Cyber Threat Overview takes a look at the threat trends observed over the past year in terms of cybercrime and state threats, with a focus on the Russian, Iranian, Chinese and North Korean threats. The major trends observed so far continue, with the...
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of February 2023. This threat landscape analysis will particularily concentrate on : – Fake claim of global payment services leader...
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of January 2023. This threat landscape analysis will particularily concentrate on two elements: The most active ransomware operators, detailing...
Vice Society is a financially motivated organization encompassing operators and opportunistic intrusion sets known for intrusion, exfiltration and extorsion against a large sample of victims since June 2021. The operator(s) of these alleged intrusion sets offer(s) an...
Context By the end of 2022, CERT Intrinsec dealt with the newly discovered bypass of ProxyNotShell named OWASSRF. This article details the modus operandi of a threat actor that exploited this vulnerability. On day one, the attackers leveraged vulnerable Exchange...
Context During 2022, a company discovered that one of their equipments was communicating with a known command and control server. As a result, the company decided to contact CERT Intrinsec in order to get help to handle the security breach and manage the crisis. CERT...