Cyber Attack

How Malware Sandboxes Strengthen Your Cybersecurity

Cyberattacks are becoming increasingly sophisticated, threatening organizations' critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs…

1 year ago

3,000+ Android Malware Using Unique Compression Methods to Avoid Detection

Android Smartphones play a vital role in our daily lives, as they help us stay connected and, not only that,…

1 year ago

Cyber Criminals Attacking Web Services to Breach Organisations

Web servers are a prime target for threat actors due to their open and volatile nature. However, these servers must…

1 year ago

Researchers Uncover Series of Ransomware Attacks that Follow Same Pattern

Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well. Numerous…

1 year ago

Authorities Taken Down Bulletproof Hosting Provider Lolek

The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and…

1 year ago

TargetCompany Ransomware Deploy Fully Undetectable Malware on SQL Server

The TargetCompany ransomware (aka Mallox, Fargo, and Tohnichi) is actively targeting the organizations that are using or running vulnerable SQL…

1 year ago

New PaperCut NG/MF Flaw Let Attackers Execute Code on Unpatched Windows Servers

A Critical vulnerability was discovered in the widely used PaperCut MG/ NF print management software running on Windows prior to…

1 year ago

Hackers Deliver Magniber Ransomware Disguised as Windows Security Update

Magniber Ransomware was first detected in late 2017; it targeted South Korean users through malvertising attacks using the Magnitude Exploit…

1 year ago

Ongoing Attacks: Over 600+ Citrix Servers Compromised to Install Web Shells

A critical remote code execution (RCE) vulnerability identified as CVE-2023-3519 has been the subject of several attacks, which have already compromised and…

1 year ago

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hackers come in many forms with sophisticated Hacking Techniques, While there has been a lot of discussion about online security…

1 year ago