Cyber Security Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide Published 4 years ago on October 29, 2022 By GFiuui45fg Share Tweet In this Help Net Security video, Dmitry Bestuzhev, Most Distinguished Threat Researcher at BlackBerry, talks about some of the most interesting tactics, techniques, and procedures employed by cybercriminals in recent months. These are: The exploitation of Log4ShellTrojanization of security and privacy-focused toolsMalicious ads based on the victim’s location and browser referrerSupply-chain attacks through open-source projects Source: https://www.helpnetsecurity.com/2022/10/28/4-notable-ttps-used-by-cybercriminals-worldwide-video/ Post Views: 731 Related Topics:Cyber ThreatsCyberattack Up Next Economic strife fuels cyber anxiety Don't Miss Delivering visibility requires a new approach for SecOps Advertisement You may like Hackers email stolen student data to parents of Nevada school district Rising OT/ICS cybersecurity incidents reveal alarming trend Best Software Defined Perimeter (SDP) Tools in 2023 Click to comment Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Latest Trending Cybersecurity2 days ago Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks Cybersecurity2 days ago LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure Cybersecurity2 days ago CISA Flags Actively Exploited ConnectWise and Microsoft Windows Vulnerabilities in KEV Catalog Cybersecurity3 days ago Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push Cyber Security3 days ago Brazil’s LofyGang Returns After Three Years With Minecraft LofyStealer Malware Campaign Targeting Gamers Cybersecurity2 days ago CISA Flags Actively Exploited ConnectWise and Microsoft Windows Vulnerabilities in KEV Catalog Cybersecurity2 days ago LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure Cyber Security3 days ago Brazil’s LofyGang Returns After Three Years With Minecraft LofyStealer Malware Campaign Targeting Gamers Cybersecurity2 days ago Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks Cybersecurity3 days ago Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push