Sunday, May 19, 2024
Next-Gen Email Firewall

Fortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript Code

Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use for malicious purposes.These vulnerabilities...

3AM Ransomware Attack – Stop Services & Delete Shadow Copies Before Encrypting

Ransomware is a universal threat to enterprises, targeting anyone handling sensitive data when profit potential is high.A new ransomware named 3AM has surfaced and...

How To Respond Cyber Incident In your Organization

An incident response plan is very essential for any organization to respond to an incident as quickly as possible. Here we have overviewed how...

Threat Actors Abuse Google Groups to Send Fake order Notifications

Threat actors continue to evolve their spam tactics by utilizing legitimate  Google Groups to send Fake order messages to target multiple users. Fake order scams...

Microsoft Teams as a Tool for Storm-0324 Threat Group to Hack Corporate Networks

According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations.However, as of July...

Weaponized Free Download Manager for Linux Steals System Data & Passwords 

In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1 2023.In the case of...

Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months

Cybersecurity researchers at Symantec's Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach an Asian national grid...

New Sponsor Malware Attacking Government & Healthcare Organizations

The Ballistic Bobcat is an Iran-aligned APT group, and initially, about two years ago, cybersecurity researchers at ESET tracked this threat group. Here below,...
Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the...
Microsoft Authenticator Blocks Malicious Notification

Microsoft Authenticator New Feature Blocks Malicious Notification by Default

In an age where online threats loom large, safeguarding our personal and professional accounts has never been more critical. With hackers tirelessly attempting to breach...

Managed WAF protection


Recent Articles