Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months
Cybersecurity researchers at Symantec's Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach an Asian national grid...
North Korean and Chinese Hackers Attacking Healthcare Industries
Healthcare has been one of the primary industries targeted by threat actors as part of every malware or ransomware campaign. Many Advanced Persistent Threat...
Most Important Steps to Prevent Your Organization From Identity Theft – Detailed Explanation
Identity theft by Identity Thief is the ponder utilization of another person's character, it is a genuine wrongdoing(a serious crime). Identity Thief utilizes data about anybody without...
Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code
A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT...
Massive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations
Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics. They leverage advanced technologies, use social engineering techniques, and collaborate...
Hackers Increasing the use of “Command Line Evasion and Obfuscation” to Spread Advance...
Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and obfuscation technique give more...
Lazarus APT Laundered Over $900 Million Worth of Cryptocurrency
Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately was the Cross-chain crime....
How To Respond Cyber Incident In your Organization
An incident response plan is very essential for any organization to respond to an incident as quickly as possible. Here we have overviewed how...
A Malvertiser called “RoughTed” Bypass Ad-blocker and Get Half a Billion visits in 3...
A Malvertiser called "RoughTed" Successfully Bypass the Ad-Blockers and Delivery Malicious Payloads into the visitors Operating Systems and Browsers which is used to visit...
WhatsApp & Telegram Accounts Compromised By New Vulnerability that Allowed Hackers to Take over...
Checkpoint Researchers Compromised Both Whatsup & Telegram chat applications which served by End-to -End Encryption.Both application designed with strong encryption that won't allow to...