Detect and Prevent Fraud, Data Leaks and Advanced Internal as well as External Attack for Cyber Infrastructure with Security Orchestration, Automation and Response
A new piece of malware dubbed as LookBack, is being utilized by its creators to cripple utilities sectors in the US. The emails used in the phishing campaign were sent...[ read more ]
A new version of the Astaroth malware has surfaced again & is making use of native microsoft tools to evade common security solutions. Attackers are making use of Mal-Spam campaigns...[ read more ]
While most of the ransomware being developed by attackers function by encrypting victim’s data & demanding them to pay a certain amount of ransom, mostly in bitcoin. GermanWiper takes a...[ read more ]
Researchers have identified a new version of the notorious H-worm RAT, which is now making use of obfuscation techniques to avoid being detected by antivirus software. Technical Details The...[ read more ]
Researcher have identified a new Cryptojacking malware dubbed Beapy, which makes use of Leaked NSA exploits (DoublePulsar & EternalBlue) to infect & spread across enterprise network in Asia. Technical...[ read more ]
The malware is developed with the intent to harvest confidential information as well as account credentials & has always posed a serious threat to individuals & organization around the world....[ read more ]
GetCrypt Ransomware was first detected in May of 2019 & functions as every other ransomware. The only difference is that it appends the encrypted files with two extensions:- .vip A...[ read more ]
The Gootkit Trojan was created with the intent to steal confidential information from its victim and creates a backdoor & downloads additional malicious files on the victim device. Gootkit was...[ read more ]
Cardinal RAT has surfaced again, after being in the shadows for nearly two years & this time it is targeting companies in the Fintech & Cryptocurrency Trading sector. Technical...[ read more ]
A recently discovered vulnerability that has been found in the logic that takes care of access control of a few hardware components in Cisco’s proprietary Secure Boot implementation, which if...[ read more ]