+1.813.321.0987
InfoSec Articles (08/16/21 – 08/30/21)

InfoSec Articles (08/16/21 – 08/30/21)

In the last 2 weeks of August, we saw campaigns use a multitude of infection components to deliver two widely popular commodity malware and remote access trojans (RATs): njRAT and AsyncRAT. Also, campaigns use a multitude of infection components to deliver two widely...
InfoSec Articles (08/02/21 – 08/16/21)

InfoSec Articles (08/02/21 – 08/16/21)

In this first half of August, we saw that during Cyble’s routine Open-Source Intelligence (OSINT) research, we came across a malware posted by a researcher on Twitter. Also, a new Android trojan, dubbed FlyTrap, that’s spread to more than 10,000 victims via rigged...
InfoSec Articles (07/19/21 – 08/02/21)

InfoSec Articles (07/19/21 – 08/02/21)

Over the past two weeks, we saw that the Government sanctioned cyber-surveillance is back in the news, following an exposé that reveals how commercial malware is being used by authoritarian regimes used to target activists, politicians, and journalists. Also, we...
InfoSec Articles (07/05/21 – 07/19/21)

InfoSec Articles (07/05/21 – 07/19/21)

Over the past 2 weeks, we saw Threat actors behind the infamous TrickBot malware have been linked to a new ransomware strain named “Diavol,”. Also, a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked...
InfoSec Articles (06/07/21 – 06/21/21)

InfoSec Articles (06/07/21 – 06/21/21)

In the last two weeks of June, we saw the Japanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang that attacked its network in Japan. “Fujifilm Corporation in Tokyo does not comment on the demand but I can confirm we...
InfoSec Articles (03/01/21 – 03/15/21)

InfoSec Articles (03/01/21 – 03/15/21)

In the first half of March, we recently observed a new series of Microsoft-themed phishing attacks. Also, with ransomware becoming the most significant cybersecurity threat faced by organizations, we found a distinct shift in the cyber threat landscape.     ...