all InfoSec news
Anomali Cyber Watch: Mustang Panda Adopted MQTT Protocol, Redis Miner Optimization Risks Data Corruption, BlackLotus Bootkit Reintroduces Vulnerable UEFI Binaries
Anomali Blog www.anomali.com
The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Backdoors, Cryptojacking, Phishing, Ransomware, Secure boot bypass, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence …
anomali anomali cyber watch apt backdoors blacklotus boot bootkit bypass check corruption cryptojacking cyber data discuss intelligence ioc iocs logs malicious miner mqtt mustang panda optimization panda phishing protocol ransomware redis risks secure boot stories threat threat intelligence topics uefi vulnerabilities vulnerable watch