+1.813.321.0987
InfoSec Articles (11/08/2022 – 11/22/2022)

InfoSec Articles (11/08/2022 – 11/22/2022)

Over the past two weeks, we saw the ultimate Trojan horses “Containers”, the ultimate Trojan horses meant to be immutable. Also, TA542, an actor that distributes Emotet malware, has once again returned from an extensive break from delivering malicious...
InfoSec Articles (10/25/2022 – 11/08/2022)

InfoSec Articles (10/25/2022 – 11/08/2022)

Over the past two weeks, we saw Emotet botnet starts blasting malware again after 4 month break. The Emotet malware operation is again spamming malicious emails after almost a four-month “vacation” that saw little activity from the notorious cybercrime operation....
InfoSec Articles (10/25/2022 – 11/08/2022)

InfoSec Articles (10/13/2022 – 10/25/2022)

Over the last two weeks we saw the new “Prestige” ransomware that  impacts organizations in Ukraine and Poland. Also, Cisco Talos discovered a new attack framework including a command and control (C2) tool called “Alchimist” and a new malware “Insekt” with remote...
InfoSec Articles (10/25/2022 – 11/08/2022)

InfoSec Articles (09/29/2022 – 10/13/2022)

Over the last two weeks, we saw the news article from Cisco Talos, they discovered a new remote access trojan (RAT) called “MagicRAT,” developed and operated by the Lazarus APT group. Also read more about the Shikitega, a new stealthy malware targeting Linux.For more...
InfoSec Articles (09/12/2022 – 09/29/2022)

InfoSec Articles (09/12/2022 – 09/29/2022)

Over the last two weeks, we saw that while monitoring the Emotet botnet current activity, security researchers found that the Quantum and BlackCat ransomware gangs are now using the malware to deploy their payloads. This and other news you find here.For more articles,...
InfoSec Articles (10/25/2022 – 11/08/2022)

InfoSec Articles (08/29/2022 – 09/12/2022)

Over the last two weeks, we saw the new BianLian ransomware gang, used subtle techniques to exploit, enumerate, and move laterally in victim networks to remain undetected and aggressively worked to counter Endpoint Detection & Response (EDR) protections during the...