Cyber Security Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide Published 4 years ago on October 29, 2022 By GFiuui45fg Share Tweet In this Help Net Security video, Dmitry Bestuzhev, Most Distinguished Threat Researcher at BlackBerry, talks about some of the most interesting tactics, techniques, and procedures employed by cybercriminals in recent months. These are: The exploitation of Log4ShellTrojanization of security and privacy-focused toolsMalicious ads based on the victim’s location and browser referrerSupply-chain attacks through open-source projects Source: https://www.helpnetsecurity.com/2022/10/28/4-notable-ttps-used-by-cybercriminals-worldwide-video/ Post Views: 733 Related Topics:Cyber ThreatsCyberattack Up Next Economic strife fuels cyber anxiety Don't Miss Delivering visibility requires a new approach for SecOps Advertisement You may like Hackers email stolen student data to parents of Nevada school district Rising OT/ICS cybersecurity incidents reveal alarming trend Best Software Defined Perimeter (SDP) Tools in 2023 Click to comment Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Latest Trending Cybersecurity3 days ago Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks Cybersecurity3 days ago LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure Cybersecurity3 days ago CISA Flags Actively Exploited ConnectWise and Microsoft Windows Vulnerabilities in KEV Catalog Cybersecurity4 days ago Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push Cyber Security4 days ago Brazil’s LofyGang Returns After Three Years With Minecraft LofyStealer Malware Campaign Targeting Gamers Cybersecurity3 days ago CISA Flags Actively Exploited ConnectWise and Microsoft Windows Vulnerabilities in KEV Catalog Cyber Security4 days ago Brazil’s LofyGang Returns After Three Years With Minecraft LofyStealer Malware Campaign Targeting Gamers Cybersecurity3 days ago LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure Cybersecurity3 days ago Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks Cybersecurity4 days ago Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push