threathunting (2)

30999073457?profile=RESIZE_400xSentinelLABS has provided yet another expert analysis.  Tracking threat actor infrastructure has become increasingly complex.  Modern adversaries rotate domains, reuse hosting, and replicate infrastructure templates across operations, making it difficult to connect isolated indicators to broader activity.  Checking an IP address, a domain, or a certificate in isolation often yields little value when adversaries hide behind short-lived domains and churned TLS certificates.  As a result, analysts

13723612478?profile=RESIZE_400xThe US Secret Service on 23 September reported it has foiled what appears to be a sophisticated plot for cyber-espionage and disruption of mobile networks in New York at a time when more than 100 heads of state and governments and foreign ministers are in the city for the UN General Assembly’s leaders’ session.

In a statement, the Secret Service said that the agency recovered more than 300 co-located SIM servers and 100,000 SIM cards across multiple sites in New York tristate area.  The agency s