+1.813.321.0987
InfoSec Articles (03/28/2022 – 04/11/2022)

InfoSec Articles (03/28/2022 – 04/11/2022)

Over the last two weeks, we saw that “from the beginning of 2022, we have dealt with six different strains of wiper malware targeting Ukraine: WhisperKill, WhisperGate, HermeticWiper, IsaacWiper, CaddyWiper, and DoubleZero. These attacks are notable on their...
InfoSec Articles (03/15/2022 – 03/28/2022)

InfoSec Articles (03/15/2022 – 03/28/2022)

Over the last two weeks, we saw that KELA published a report on ransomware operators’ overall trends and movements over 2021. The cybersecurity firm says that the number of major organizations tracked as ransomware victims increased from 1460 to 2860. In addition, the...
InfoSec Articles (02/28/2022 – 03/15/2022)

InfoSec Articles (02/28/2022 – 03/15/2022)

Over the last couple of weeks we saw On February 24, 2022, Anonymous — a global collective of hackers — announced it was launching a cyber operation against Russian President Vladimir Putin and the Russian state for invading Ukraine. At 2:50 PM EST on February 24,...
Threat Intelligence Providers vs Threat Intelligence Platforms

Threat Intelligence Providers vs Threat Intelligence Platforms

In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against cyber threats. This can be done through the use of threat intelligence where data comprised of past and current indicators...
InfoSec Articles (02/14/2022 – 02/28/2022)

InfoSec Articles (02/14/2022 – 02/28/2022)

Over the past two weeks, we saw that Cyclops Blink appears to be a replacement framework for the VPNFilter malware exposed in 2018, which exploited network devices, primarily small office/home office (SOHO) routers, and network-attached storage (NAS) devices. In...
InfoSec Articles (02/01/2022 – 02/14/2022)

InfoSec Articles (02/01/2022 – 02/14/2022)

Over the past two weeks, we saw “FritzFrog”, a peer-to-peer (P2P) botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. And also, Qualys...