InfoSec Articles (11/17/20 – 12/01/20)

InfoSec Articles (11/17/20 – 12/01/20)

On to the start of the last month of the year and just around Thanksgiving, cyber crimes are still rampant. Even GoDaddy was also a victim of a scam using voice phishing or vishing. The scam shows how vishing can be more deceptive than email schemes. Learn more about...
InfoSec Articles (11/02/20 – 11/16/20)

InfoSec Articles (11/02/20 – 11/16/20)

Several cases were observed where DLL side-loading was used to execute the malicious code. Side-loading is the use of a malicious DLL spoofing a legitimate one, relying on legitimate Windows executables. Learn more on this and other news in this batch of InfoSec...
Threat Intelligence Data Providers vs Threat Intelligence Platforms

Threat Intelligence Data Providers vs Threat Intelligence Platforms

In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against cyber threats. This can be done through the use of threat intelligence where data comprised of past and current indicators...
InfoSec Articles (10/18/20 – 11/01/20)

InfoSec Articles (10/18/20 – 11/01/20)

Upon entering the second to the last month of the year, there are a lot of botnets, banking malware, and malware making the news. But one that stands out is Kimsuky. Kimsuky uses various spearphishing and social engineering methods to obtain Initial Access to victim...
InfoSec Articles (10/03/20 – 10/17/20)

InfoSec Articles (10/03/20 – 10/17/20)

There has been a lot of RATs as well as botnets lately, such as HEH. HEH Botnet is spreading through brute force of the Telnet service on ports 23/2323. The bot does not really care of what the end devices are, as long as it can enter the device, it will try its luck...
InfoSec Articles (09/18/20 – 10/02/20)

InfoSec Articles (09/18/20 – 10/02/20)

One of the common malware being reported nowadays is the Remote Access Trojan or RAT, such as the LodaRAT. Written in Autolt, LodaRAT not only have abandoned their usual obfuscation techniques, but several functions have also been rewritten and new functionality has...