Another twist on the Emotet botnet has been observed by security researchers to further its malicious agenda. It is now pretending to be an attachment from Windows Update telling the receivers of the spam email to update their Microsoft Word application. As we all know, Emotet is a type of malware that gets distributed via...Continue Reading
The latest discovered technique that can be abused to create and deliver phishing pages and financial malware while avoiding leading enterprise-grade security products was found by a cybersecurity researcher using Google App Engine domains. Google App Engine is a cloud service platform for developing and deploying web applications on Google’s servers. There are phishing campaigns...Continue Reading
A collaborative attack has been unwrapped recently by cybersecurity experts that have been targeting the Linux Operating System. Developers such as Red Hat Enterprise, CentOS, and Debian are said to be the focus of this malicious attack. According to the uncovered pieces of evidence, the attack was perpetrated by 5 different Advanced Persistent Threats (APT)...Continue Reading
With its sudden popularity and discovery in May 2020, Lucifer botnet malware again makes noise within the Cybersecurity community. A new report has confirmed that the latest update of the malware becomes more lethal as this can now infect a network that uses the Linux Operating system. With it already being a powerful tool for...Continue Reading
A reportedly high-risk vulnerability of TeamViewer was recently discovered targeting Windows users, which, if exploited, could result in Cybercriminals stealing your system password and further exploitations. This attack does not require interaction from their victim as it can perform automatically. About TeamViewer TeamViewer is a software application that is used for remote control, desktop...Continue Reading
A newly discovered campaign has been unraveled again, targeting the famous Microsoft Office 365 accounts. In the recent report of Cybersecurity experts, they unveiled the use of Google Ads and other related Google applications and Microsoft Platform such as Office 365 login pages as their current modus operandi tool for these adversaries to continue their...Continue Reading
With the evidence gathered by Cybersecurity experts, they were able to conclude that even after the ransomware attack has been dealt, perpetrators continue its reconnaissance on their prey. As reported, on the recently concluded Maze Ransomware attack, a department Incident Report that circulates within the network of ST Engineering named VT San Antonio Aerospace (VT...Continue Reading
Domain Takedown by Microsoft With the numerous reports of Cybercrime that targeted many Office 365 accounts, Microsoft launched its mitigation plan to address such crisis, mainly as this fraudster uses Covid-19 themed attacks. As stipulated on their plea in the U.S. District Court for the Eastern District of Virginia, they were able to take down...Continue Reading
It started in 2013 and then publicly exposed in 2018, and the Invisimole malware attack resurfaced again with a more sophisticated and stealthier comeback. The knowledge came from the collaborative effort of the compromised firm and cybersecurity experts of the ESET company. ESET confirmed through the evidence gathered from high military and diplomatic personnel organizations...Continue Reading
The timing of the payload Having the right timing results in a high success rate for any plan. Information Security experts from a private security firm, they were able to observe the ingenuity of using Ryuk ransomware with perfectly timing the payload. Based on the statistics, the patience of time given by the attacker with...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.