cognitive cybersecurity intelligence

News and Analysis

Search

Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing

IBM X-Force has been monitoring the evolution of Russian threat actor Hive0051’s malware capabilities for the past 18 months, noting significant advances. Key improvements include a multi-channel approach to DNS fluxing, obfuscated multi-stage scripts, and fileless PowerShell versions of Gamma malware. Hive0051’s escalating activity, including an increase in active infections and unique malicious domains, signifies an elevation of resources and ongoing operations.

Source: securityintelligence.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Connecting Tech to Black America

Tech evangelist David Lee spotlights the underrepresentation of Black Americans in tech, an issue he contends requires collective action to rectify. He suggests fostering connections

Zero-Day Attack Hits Cybersecurity Leader

The MITRE Corporation, a contributor to public interest cybersecurity, disclosed a data breach originating from a state-backed hack. Detected after suspicous activity was noticed on

Defining and Understanding Trust Assurance

Trust is essential for businesses and building it requires embracing the pillars of trust assurance: predictive, integrated, and transparent systems. Through trust assurance, businesses can