Coinminers Abusing WebLogic Vulnerabilities
Recently security researchers found malicious actors exploiting old and recently disclosed Oracle Weblogic Server vulnerabilities to deliver the crypto miner malware on the infected hosts. Mostly the Oracle Weblogic Servers…
The Most Popular Microsoft Hardens Brute Force Attacks of windows 11
Microsoft has made some security improvements against brute force attacks against RDP (Remote Desktop Protocol) in the latest version of the Windows 11 Operating system. What Microsoft security enhancement is…
What is Cyber Threat Hunting?
In recent years, the Term “Threat Hunting” has become the most important component of Cyber Security Programs. Most Enterprises and Cyber Professionals have started to adopt the Threat hunting terminology…
Storm Botnet and its Purpose of Cyberattacks
The Storm Botnet was a botnet that was initially identified in the year 2007. It is also known as Dorf botnet and Ecard Malware like similar botnets it was controlled…
Google Search engines targeted by recent adware campaigns
As per the Palo Alto cyber security analyst, a recent adware campaign has been found targeting google search engine requests through malicious browser extensions. Palo’s threat intelligence claims that attackers…
Microsoft Exchange server exploited by Squirrelwaffle malware
Squirrelwaffle targeted vulnerable exchange servers to spread malspam through hijacked email threads as reported by the Sophos tech. As per the experts, the Squirrelwaffle is a new malware loader that…
Apple’s IOS with critical Zero-day Webkit Vulnerability
Apple has released an IOS update for Apple devices that fixes the CVE- 2022-22620 vulnerability in the WebKit browser engine that hackers would have already exploited in a wild. And…
The Underrated 5Cs of Cyber Security You Need to Know
5Cs of Cyber Security Physical and logical Cyber security is the topmost priority for most enterprises today. The risk management plan for Cyber security is as essential as having a…
The Incredible Cyber Kill Chain model we Can’t Live Without
The Cyber kill chain is the term which was initially started from the military, the military term as kill chain. Here cyber kill chain model has different stages of an…
The Ultimate Indian Army Faces Trojan Attacks from Android Malware
Recently security researchers have brought to a notice that an Android malware that pretends to be the legitimate ARMAAN (armaan.apk) application which would be developed by India’s govt related to…