Cyber Attack

How Malware Sandboxes Strengthen Your CybersecurityHow Malware Sandboxes Strengthen Your Cybersecurity

How Malware Sandboxes Strengthen Your Cybersecurity

Cyberattacks are becoming increasingly sophisticated, threatening organizations' critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs…

2 years ago
3,000+ Android Malware Using Unique Compression Methods to Avoid Detection3,000+ Android Malware Using Unique Compression Methods to Avoid Detection

3,000+ Android Malware Using Unique Compression Methods to Avoid Detection

Android Smartphones play a vital role in our daily lives, as they help us stay connected and, not only that,…

2 years ago
Cyber Criminals Attacking Web Services to Breach OrganisationsCyber Criminals Attacking Web Services to Breach Organisations

Cyber Criminals Attacking Web Services to Breach Organisations

Web servers are a prime target for threat actors due to their open and volatile nature. However, these servers must…

2 years ago
Researchers Uncover Series of Ransomware Attacks that Follow Same PatternResearchers Uncover Series of Ransomware Attacks that Follow Same Pattern

Researchers Uncover Series of Ransomware Attacks that Follow Same Pattern

Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well. Numerous…

2 years ago
Authorities Taken Down Bulletproof Hosting Provider LolekAuthorities Taken Down Bulletproof Hosting Provider Lolek

Authorities Taken Down Bulletproof Hosting Provider Lolek

The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and…

2 years ago
TargetCompany Ransomware Deploy Fully Undetectable Malware on SQL ServerTargetCompany Ransomware Deploy Fully Undetectable Malware on SQL Server

TargetCompany Ransomware Deploy Fully Undetectable Malware on SQL Server

The TargetCompany ransomware (aka Mallox, Fargo, and Tohnichi) is actively targeting the organizations that are using or running vulnerable SQL…

2 years ago
New PaperCut NG/MF Flaw Let Attackers Execute Code on Unpatched Windows ServersNew PaperCut NG/MF Flaw Let Attackers Execute Code on Unpatched Windows Servers

New PaperCut NG/MF Flaw Let Attackers Execute Code on Unpatched Windows Servers

A Critical vulnerability was discovered in the widely used PaperCut MG/ NF print management software running on Windows prior to…

2 years ago
Hackers Deliver Magniber Ransomware Disguised as Windows Security UpdateHackers Deliver Magniber Ransomware Disguised as Windows Security Update

Hackers Deliver Magniber Ransomware Disguised as Windows Security Update

Magniber Ransomware was first detected in late 2017; it targeted South Korean users through malvertising attacks using the Magnitude Exploit…

2 years ago
Ongoing Attacks: Over 600+ Citrix Servers Compromised to Install Web ShellsOngoing Attacks: Over 600+ Citrix Servers Compromised to Install Web Shells

Ongoing Attacks: Over 600+ Citrix Servers Compromised to Install Web Shells

A critical remote code execution (RCE) vulnerability identified as CVE-2023-3519 has been the subject of several attacks, which have already compromised and…

2 years ago

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hackers come in many forms with sophisticated Hacking Techniques, While there has been a lot of discussion about online security…

2 years ago