Computer Security
SOC Second Defense Phase – Understanding the Cyber Threat Profiles
In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the...
Computer Security
Cyber Security is Not an Easy Game for CISO – It’s an Absolute End Game!
Let’s breakdown the little pieces and the critical dots to connect in the perspective of a CISO and a point-of-view from CyberSpace.The threats...
Backdoor
Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor
Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard to detect...
Computer Security
Most Important Steps to Prevent Your Organization From Identity Theft – Detailed Explanation
Identity theft by Identity Thief is the ponder utilization of another person's character, it is a genuine wrongdoing(a serious crime). Identity Thief utilizes data about anybody without...
Computer Security
Proofpoint Q2 Threat Report – Ransomware Returns, Growth in Social Engineering and Email Fraud
According to Proofpoint Q2 Threat Report, the malicious message volume increased by 36% in the second quarter of 2018 and the ransomware returns back...
THREATS
Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code
A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT...
Infosec- Resources
Hackers Increasing the use of “Command Line Evasion and Obfuscation” to Spread Advance Level Threats
Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and obfuscation technique give more...
THREATS
A Malvertiser called “RoughTed” Bypass Ad-blocker and Get Half a Billion visits in 3 Months
A Malvertiser called "RoughTed" Successfully Bypass the Ad-Blockers and Delivery Malicious Payloads into the visitors Operating Systems and Browsers which is used to visit...