Tag
Democratization of Business Email Compromise (BEC) Attacks
2 rules 2 TTPs 1 CVE 6 IOCsAttackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.
Potential JAVA/JNDI Exploitation Attempt
2 rules 5 TTPs 1 CVEThis rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.
Ongoing Exploitation of Cisco SD-WAN Systems
3 rules 4 TTPsMalicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.