Bismuth adversaries that are often allegedly linked to OceanLotus or APT32 again resurfaced after the cybersecurity experts connected them to recent unravelled intrusion happened to different organization in France and Vietnam. The group has been known since 2012, is used primarily for cyber espionage of a well-known country for intel gathering. With the usual approach,...Continue Reading
Three Nigerian nationals that are ostensibly pointed out as the Threat actors behind a malware distribution for phishing and other scams worldwide lead the joint force of INTERPOL, Nigeria Police Force cybercrime investigation, and Group-IB for their Operation Falcon in Lagos, Nigeria. There were reportedly 50,000 victims that were identified in an enormous Global Scam...Continue Reading
With the United States on the hot plate with its current election, recent QBot attacks have also been observed working its dreaded activity simultaneously. Cybersecurity experts have submitted their malware analysis report containing evidence of infected attachment with the subject of the 2020 Election of the most powerful nation in the world. Based on the...Continue Reading
A new variant of scheming for Office 365 credentials has been observed by cybersecurity experts as they stumbled on this method of the adversary. Unlike the usual exfiltration of credentials through the use of specialized spyware/malware, the method used was now based on the real-time response from the victim upon entering their credentials of the...Continue Reading
A newly submitted malware analysis report has been concluded that the QakBot is still quacking with more virulent features placing it again on the watchlist of many cybersecurity experts. According to the report, a new variant of QakBot has been released, terrorizing prominent government and producing sectors, mainly in the United States, Europe, and other...Continue Reading
Recent news spread within the Cybersecurity community is about the data breach suffered by the SANS Institute. Being known for providing certification and training about network security, this only proves that everyone is susceptible to such malicious activity. According to SANS Institute, they have shared this incident for the community to be able to mitigate...Continue Reading
With the sensationalized successful hacking with Twitter recently, the US Department of Justice, and other Law Enforcement Authority, did not waste time to uncover the identity of the hackers. Due to the enforcers’ intensified effort, they were able to track down these adversaries behind the attack and able press charges for their committed crime. According...Continue Reading
Prominently known since 2014, the government-backed Iranian hackers, accidentally exposed their stealth method hacking process due to a glitch on the security imposed on its cloud virtual private storage. Known as ITG18 (also called Charming Kitten, Phosphorous, or APT35), they specialize in gathering intelligence and espionage targeting the United States and Middle Eastern high ranking...Continue Reading
Amazon is an eCommerce company that currently has US$14.541 billion in operating income in 2019. This eCommerce giant has been one of the go-to shopping platforms of people now more than ever because of lockdown implementation caused by COVID-19. As many are ordering their stuff online as it’s safer than leaving the house excessively, Amazon...Continue Reading
Experts still consider phishing as the most commonly used attack on the organization, and it tops all online surveys. Out of the 2,109 organizations recently hit by a cyberattack, over half were victims of phishing. Phishing is still the most widespread cyberattack in all countries except for Colombia, where it was the second most common...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.