Ankura CTIX FLASH Wrap-up Report: May 2022

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
The Ankura Cyber Threat Investigations and Expert Services (CTIX) FLASH Wrap-Up report is a collection of high-level cyber intelligence summaries pertaining to current or emerging cyber events...
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

The Ankura Cyber Threat Investigations and Expert Services (CTIX) FLASH Wrap-Up report is a collection of high-level cyber intelligence summaries pertaining to current or emerging cyber events originally published in the May series of CTIX FLASH Updates, our semi-weekly newsletter that provides a timely snapshot of cyber events, geared toward cyber professionals and end-users with varying levels of technical knowledge.

The events published in the FLASH newsletter typically occurred close in time to the publication of the report. This publication includes a discussion of ransomware/malware threats, threat actor activity, and newly identified vulnerabilities impacting a wide range of industries and victims.

Download the full CTIX Wrap-Up Report to learn key observations from Ankura's Cyber Threat Investigations and Expert Services team including:

  • Multiple state-sponsored cyber-espionage campaigns, including phishing, wiping, and ransomware, as well as campaigns facilitated by financially motivated threat actors.
  • New strains of malware, as well as variants and upgrades of notorious malware, are altering the tactics, techniques, and procedures (TTPs) of threat actors used to deploy the payloads.
  • New sets of devastating critical vulnerabilities, such as Spring4Shell, JekyllBot:5, and Nimbuspwn, each of which creates novel attack vectors whereby threat actors try to gain access to their victims' infrastructure.

To read the full article click here

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More