Boost your cyber resilience
Talk to an expert about BarracudaONE and Managed XDR
This video is a decorative animation with no sound.
This chart is based on data from Barracuda AI.
Barracuda Research delivers actionable insights from trillions of IT events, AI-powered threat detection and real-world security incidents. Our advanced threat intelligence empowers IT security professionals with the knowledge to identify emerging threats, recognize the warning signs and implement effective protection strategies for their businesses.
Attackers are using Tycoon and EvilProxy phishing-as-a-service (PhaaS) kits to gain unauthorized access to Microsoft OAuth and redirect URLs to malicious pages.
See the details and the action to take to protect against the attacks:
Attackers are leveraging Logokit and EvilProxy PhaaS kits on a range of online platforms to create and host phishing pages.
See the details and the action to take to protect against the attacks:
Attackers are using advanced techniques to evade detection and steal login credentials.
See the details and the action to take to protect against the attacks:
Attackers are exploiting a known vulnerability to bypass MFA, gain network access and deploy ransomware against unpatched or improperly migrated systems.
See the details and the action to take to protect against the attacks:
Attackers exploit vulnerabilities to bypass authentication and gain administrative access, leading to data breaches and ransomware attacks.
See the details and the action to take to protect against the attacks:
Attackers are engaging in stealthy methods, including compression and steganography, to steal sensitive information without detection.
See the details and the action to take to protect against the attacks:
Barracuda Managed XDR and the SOC team recently mitigated a ransomware attack that tried to evade detection by exploiting tools in the target’s infrastructure and disguising the malicious activity as everyday IT.
Barracuda Managed XDR and the SOC team recently helped two companies mitigate incidents where attackers compromised computers and installed ScreenConnect remote management software.
At one company, there were signs of data exfiltration linked to a convoluted series of malicious downloads. At the other company, there was evidence of malicious scripts and persistence techniques.
Ransomware attackers often use scheduled tasks to automate different stages of the attack, maximizing the impact of the attack while reducing the chances of detection. Attackers create scheduled tasks for several reasons, including:
“Threat actors are manipulating AI assistants and tampering with AI security features to steal information. Security must include intelligent detection, adaptive automation and human-centric design.”
Ashok Sakthivel
Director – Engineering, Email Protection
Threat Spotlight: How attackers poison AI tools and defenses
“SharePoint and other tools are part of the critical attack surface. Every business should focus on rapid detection, containment and recovery. Resilience starts with visibility and a clear business continuity plan.”
Adam Khan
VP security operations, Barracuda Managed XDR
Cybersecurity Threat Advisory on Microsoft SharePoint zero-day vulnerability
Barracuda provides a wide range of cyberthreat and cybersecurity insights, tools and support to help organizations and security researchers better understand the rapidly evolving threat landscape and how to manage risk.
Talk to an expert about BarracudaONE and Managed XDR
Company Information
Our Websites