Tuesday, February 25, 2025

THREATS

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the...

Cyber Security is Not an Easy Game for CISO – It’s an Absolute End Game!

Let’s breakdown the little pieces and the critical dots to connect in the perspective of a CISO and a point-of-view from CyberSpace.The threats...

Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor

Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard to detect...

Most Important Steps to Prevent Your Organization From Identity Theft – Detailed Explanation

Identity theft by Identity Thief is the ponder utilization of another person's character, it is a genuine wrongdoing(a serious crime). Identity Thief utilizes data about anybody without...

Proofpoint Q2 Threat Report – Ransomware Returns, Growth in Social Engineering and Email Fraud

According to Proofpoint Q2 Threat Report, the malicious message volume increased by 36% in the second quarter of 2018 and the ransomware returns back...

Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code

A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT...

Hackers Increasing the use of “Command Line Evasion and Obfuscation” to Spread Advance Level Threats

Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and obfuscation technique give more...

A Malvertiser called “RoughTed” Bypass Ad-blocker and Get Half a Billion visits in 3 Months

A Malvertiser called "RoughTed" Successfully Bypass the Ad-Blockers and Delivery Malicious  Payloads into the visitors Operating Systems and Browsers which is used to visit...