- Collaborations between public and private organizations will be vital for the UAE to deliver on digital agenda
- Announcing IBM Granite AI Models Now Available on Docker Hub | Docker
- SK쉴더스, '일렉트론' 애플리케이션 취약점 연구 보고서 공개
- KINX, 과천 데이터센터 개관··· "국내외 KINX 네트워크 플랫폼의 새로운 핵심"
- 3D 프린터에서 색상, 음영, 질감 정밀 처리··· MIT, 새 노즐 기술 소개
Threat Roundup for December 4 to December 11 – Cisco Blogs
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 4 and December 11. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.
Reference
20201211-tru.json – this is a JSON file that includes the IOCs referenced in this post, as well as all hashes associated with the cluster. The list is limited to 25 hashes in this blog post. As always, please remember that all IOCs contained in this document are indicators, and that one single IOC does not indicate maliciousness. See the Read More link above for more details.
Share: