Category Archives: Uncategorized

Geopolitical Cybercrime: LockBit Ransomware Targets ICBC

What happened? On 8 November 2023, the Industrial and Commercial Bank of China (ICBC) was attacked by the LockBit ransomware group. The ICBC is one of the world’s largest banks and is a Chinese state-owned asset. Financial media sources, such as the Financial Times and Bloomberg reported that the wider financial system was impacted as certain trades on the US Treasury market were […]

Cybercriminals Exploit Compromised Booking.com Accounts for Phishing Attacks

I recently heard about a wave of scams exploiting Booking.com users. So I went and researched it for myself. I came across a post on the r/travel subreddit about such an incident. [1] The user received a seemingly authentic message with a URL via Booking.com’s app. They provided their credit card information and said that “within […]

Top 10 Cyber Threats of 2023

Introduction The year 2023 saw numerous significant events that prompted many organizations to reevaluate their security strategies, including rethinking their choice of vendors and the size of their cybersecurity teams. Unfortunately, amidst these challenges, we witnessed thousands of layoffs in the tech sector, including cybersecurity departments. This occurred despite the relentless and ever-growing threat posed […]

The Cyber Threat Intelligence (CTI) Analyst Challenge

Welcome to the Cyber Threat Intelligence (CTI) Analyst Challenge!  I am excited to introduce a comprehensive repository designed to enhance the skills and expertise of CTI analysts through a challenging and engaging intelligence analysis exercise. Purpose This repository is created to test and improve the capabilities of CTI analysts by providing a structured challenge that […]

Tracking Adversaries: The Qilin Ransomware-as-a-Service (RaaS)

This post is part of my Tracking Adversaries blog series, where I provide a summary analysis of an adversary that has captured my attention and warrants deeper investigation. Qilin has already been extensively covered by experts from Trend Micro, Secureworks, Group-IB, SentinelOne, SOCRadar, BleepingComputer, and MalwareHunterTeam. Kudos to these researchers—without their contributions, our understanding of […]