Microsoft reported on Peach Sandstorm, which is either a stone fruit or an Iranian nation-state TA involved in espionage operations.Which one of these were used to conduct reconnaissance on victims' Active Directory?AzureHoundBloodHoundAD ExplorerAdFindWhich U.S Casino chain recently paid a ransom in the hopes of avoiding the online leak of customer data stolen in a recent cyberattackCaesarsMGM Resorts InternationalMandalay Resort GroupStation CasinosWhich group is allegedly behind the cyberattack on MGM Resorts, which have resulted in significant impact to their operations.ALPHV | Scattered SpiderZeppelin | Vice SpiderMedusa | Frozen SpiderLockBit | Bitwise SpiderHuntress provided an overview of Scattered Spider’s TTPs, following the MGM hack.What, according to Huntress, is being increasingly targeted by adversaries as a mechanism to evade or circumvent security controls?IdentitiesCritical VulnerabilitiesOpen RDPOn-Prem ExchangeCitizen Lab and Access Now reported on an exiled Russian journalist who was targeted with Pegasus malware. What was the name of the zero-click exploit used?PWNYOURHOMEFINDMYPWNDUDEWHERESMYPWNILOSTMYPWNEuropol released a spotlight report titled “Cyber-Attacks: The Apex of Crime-As-A-Service”Which one of these are deemed cyber’s “most prominent threat”?Malware-based cyber-attacksCritical VulnerabilitiesPhishingBusiness Email CompromiseBrian Krebs reported on a cybercriminal going by the name “USDoD”. Which aerospace giant's sensitive employee data was leaked by the TA? AirbusBoeingLockheed MartinEmbraerCybercx provided insights into their recent Akira ransomware investigations. From their analysis, how did the TA manage to bypass EDR tooling during their attacks?Creating new unmonitored VM’sDLL SideloadingDisable EDR with GPODeploying AuKillWired reported on Symantec’s findings of a Chinese hacker group who targeted an Asian country’s power grid.What is the name given by Symantec to this group?RedFlyRedWaspAmberPandaPowerPandaAccording to the 2024 “Homeland Threat Assessment” report from the US DHS, which one of these is the most costliest cybercrime activity?E-mail Hacking SchemesRansomwareSocial EngineeringSupply Chain Attacks