Fileless malware attacks detection and prevention
What are fileless malware attacks? In the real world, living off the land means surviving only with the available resources that you can get from nature. In the technology world,…
Hunt the Haunt
What are fileless malware attacks? In the real world, living off the land means surviving only with the available resources that you can get from nature. In the technology world,…
Cybersecurity researchers have discovered a new malware evasion technique called “Process Ghosting” with a new executable image tampering attack which could be potentially abused by the hackers in the windows…
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
As per the recent updates, the German government has decided to pass that allows German intelligence agencies to use Trojan software on its citizens without much noise in monitoring them…
Here is how Ransomware 2021 used legitimate tools to exploit the victims in ransomware campaigns. The tools were intended to be used for authorized and security researches but the ransomware…
Researchers from the Kaspersky Endpoint security firm have identified Zero-day exploit from Google’s Chrome browser and Microsoft windows zero-day exploits that have targeted multiple attacks on several enterprises. Now the…
Thanos Ransomware which targeted an attack on State-run organizations in the Middle East and North Africa on July 6 and July 9, 2020, seems to be active again as per…
On May 30th, 2021, Threat Intelligence company Cyble reported a new incident to the Bombay Stock Exchange (BSE), National Stock Exchange (NSE). A research team from Cyble performed an initial analysis…
The new Ransomware Epsilon Red was discovered Sophos malware researchers. This Ransomware is written in the Go programming language which is called Epsilon Red. The malware mainly targets the unpatched…
Business e-mail Compromise is a scam campaign hosted by the attackers to target the corporate companies by collecting the employees’ e-mail IDs from the available sources. BEC attack’s main goal…