The U.S. cybersecurity experts: It provides 25 Common Vulnerabilities and Exposures (CVEs) known to be recently leveraged or scanned.
Cyber Threats Observatory has been improved with stereotypes for each tracked malware family in three different behaviors: Domains, Files and Processes
Cyber Threats Observatory has been improved with the introduction of clustering stereotypes for each tracked malware family in three different behaviors: Domains, Files and Processes. Every malicious code, in fact, does specific actions on domains, files and processes realms by meaning that every sample contacts several domain names, spawns specific processes and eventually saves file on HD. Collecting everything coming from their execution and clustering on strings similitude would highlight several stereotypes that would be interesting for further studies or similitude blocking lists. The dashboard, developed by the cyber security expert and Yoroi’s founder Marco Ramilli, monitor trends over thousands even millions of samples, providing quantitative analyses on what has observed during the performed automatic analyses. The data inside are totally auto-generated without control and with no post-processing, and are divided in six sections: Malware Families Trends, Malware Families, Distribution Types, Threat Level Distribution, Stereotypes, and TOP domains.