ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

CISA Releases Open-Source Thorium Platform For Malware Analysis - LinkedIn

Threat Score:
58
News
6 days ago
Part of cluster #1522

Overview

EnglishUnited States Deutsch English Español Français Italiano العربية All languages Afrikaans azərbaycan bosanski català Čeština Cymraeg Dansk Deutsch eesti EnglishUnited Kingdom EspañolEspaña EspañolLatinoamérica euskara Filipino FrançaisCanada FrançaisFrance Gaeilge galego Hrvatski Indonesia isiZulu íslenska Italiano Kiswahili latviešu lietuvių magyar Melayu Nederlands norsk o‘zbek polski PortuguêsBrasil PortuguêsPortugal română shqip Slovenčina slovenščina srpski (latinica) Suomi Svenska Tiế...

Continue Reading on Original Site

Related Articles

5 articles
1

Google Discloses Salesforce Hack

Feedburner • 5 hours ago

A Google Salesforce instance may have been targeted as part of a ShinyHunters campaign that hit several major companies.

Score
87
Read more
2

Trend Micro fixes two actively exploited Apex One RCE flaws

Security Affairs • 7 hours ago

Trend Micro patched two critical Apex One flaws (CVE-2025-54948, CVE-2025-54987) exploited in the wild, allowing RCE via console injection. Trend Micro released fixes for two critical vulnerabilities, tracked as CVE-2025-54948 and CVE-2025-54987 (CVSS score of 9.4), in Apex One on-prem consoles. The cybersecurity vendor confirmed that both issues were actively exploited in the wild. Both […]

Score
87
Read more
3

Ransomware plunges insurance company into bankruptcy

Graham Cluley • 6 hours ago

Collapsed company's founder says that its fortunes were hampered by the refusal of authorities to release the criminals' seized funds to victims. in my article on the Fortra blog.

Score
86
Read more
4

Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities

Cybersecurity News • 3 hours ago

Two sophisticated ransomware operations have emerged as significant threats to managed service providers (MSPs) and small businesses, with the Akira and Lynx groups deploying advanced attack techniques that combine stolen credentials with vulnerability exploitation. These ransomware-as-a-service (RaaS) operations have collectively compromised over 365 organizations, demonstrating their effectiveness in targeting high-value infrastructure providers that serve multiple […]

Score
85
Read more
5
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 7 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

FILE PATH
/privacytools at any time.
COUNTRIES
Indonesia
United States
COMPANIES
CISA
Google
LinkedIn
Sandia National Laboratories
AGENCIES
CISA
ATTACK TYPES
Digital Forensics
Incident Response
Malware Analysis
MITRE ATT&CK
T1027
T1030
T1045
T1057
T1059.001
PLATFORMS
Kubernetes
ScyllaDB
Thorium
INDUSTRIES
Cybersecurity
Government
Private Sector
ARTICLE INFORMATION
Article #6331
Published 6 days ago
News

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration