June 21, 2023, 8:11 p.m. |

Anomali Blog www.anomali.com


The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Data leaks, Disruption, Extortion, Masquerading, Remote access trojans, Tunneling, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.

Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.



Trending Cyber News and …

access anomali anomali cyber watch apt blizzard cadet blizzard cryptocurrency cyber data data leaks detect discuss disruption doublefinger extortion gru hard intelligence iocs leaks linux rat remote access remote access trojans stories threat threat intelligence topics trojans tunneling vulnerabilities watch

More from www.anomali.com / Anomali Blog

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States