InfoSec Articles (01/01/21 – 01/15/21)

InfoSec Articles (01/01/21 – 01/15/21)

On to a new year, but it’s still good to review some malware such as APT37 to help us understand more about cybercrimes. APT37 is associated with an attack that embeds macro that uses a VBA self decoding technique to decode itself within the memory spaces of MS...
InfoSec Articles (12/17/20 – 12/31/20)

InfoSec Articles (12/17/20 – 12/31/20)

On to the last day of the controversial year, cybercrime is still rife, as the attack activities of the Quasar Family. Quasar is an open-source RAT with a variety of functions. This is easy to use and therefore exploited by several APT actors. Learn more in this batch...
InfoSec Articles (12/02/20 – 12/16/20)

InfoSec Articles (12/02/20 – 12/16/20)

A week before Christmas, cryptocurrency mining botnet PGMiner is showing smarter ways to hack into a victim’s machine. At its core, PGMiner attempts to connect to the mining pool for Monero mining. Learn more on this and other malware in this batch of InfoSec...
InfoSec Articles (11/17/20 – 12/01/20)

InfoSec Articles (11/17/20 – 12/01/20)

On to the start of the last month of the year and just around Thanksgiving, cyber crimes are still rampant. Even GoDaddy was also a victim of a scam using voice phishing or vishing. The scam shows how vishing can be more deceptive than email schemes. Learn more about...
InfoSec Articles (01/01/21 – 01/15/21)

InfoSec Articles (11/02/20 – 11/16/20)

Several cases were observed where DLL side-loading was used to execute the malicious code. Side-loading is the use of a malicious DLL spoofing a legitimate one, relying on legitimate Windows executables. Learn more on this and other news in this batch of InfoSec...
Threat Intelligence Data Providers vs Threat Intelligence Platforms

Threat Intelligence Data Providers vs Threat Intelligence Platforms

In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against cyber threats. This can be done through the use of threat intelligence where data comprised of past and current indicators...