Saturday, December 2, 2023

Macro Pack – Automatize Obfuscation and Generation of Malicious Office Documents

0
Malware delivery trends change every day. For the last few years, we have observed various hacker groups like ( APT12 to Turla ) uses...

Android Malware Delivered Through Malicious PDF Attachments Collects Phone Numbers

0
A new campaign that delivers malicious PDF file that leads to download the file malicious APK file to the user’s device.Quick heal security researchers...

What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security

0
Single Sign-on is an authentication process that helps to log in to multiple applications using single login credentials. Security is enhanced through Single Sign-on...

Gartner Released Magic Quadrant for Web Application Firewalls – Imperva WAF Selected as a...

0
Currently Web Application Firewall performing a major role in  Web application protection since the web applications are primary targets for cybercriminals and the impact...

Box Data Leak – Terabytes of Data Exposed from Companies Using cloud based Box...

0
Box is a cloud management system as like AWS S3 buckets, to manage and access your data. You can place the files in the...

Securing Kubernetes Deployments on AWS – Guide

0
Kubernetes Deployment on AWSKubernetes is open-source software for deploying and managing containerized applications at scale. Kubernetes can manage clusters on Amazon EC2 instances, run...

Free Email Security Penetration Testing Tool to Check Organization’s Security against Advanced Threats

0
BitDam launches a free Email Security Penetration Testing tool to determine the organization's security posture against advanced threats.The Email accounts are the tempting targets...

ATM Jackpotting – Cutlet Maker Malware Spike Around the World to Spit the Cash...

0
Researchers discovered a new track of ATM jackpotting attack through infamous ATM malware called “Cutlet Maker” which is now rapidly growing up around the...

Best Ways to Prepare Your Organization For Cyber Disasters

0
As technology continues to develop, the nation and its businesses become more and more reliant on the internet. This has become an even more...

APT 34 Hackers Group Owned Hacking Tools, Webshell, Malware Code, C2 Servers IP Leaked...

0
A group of hackers named "Lab Dookhtegan" leaked APT 34 Hacking Group owned powerful hacking tools, Malware source code and Web shell URL's leaked...

Managed WAF protection

Website

Recent Articles