+1.813.321.0987

InfoSec Articles (02/02/2023 – 02/14/2023)

Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the “Researchers Uncover 700+ Malicious Open Source Packages”. Also, you will see the “CISA and FBI Release ESXiArgs Ransomware Recovery...

Finding the Best Threat Intelligence Vendor

Everyone in our line of business wants to be considered the best threat intelligence vendor. The task of gathering and producing top-notch cyber threat intelligence (CTI) is harder than you might think, however. Here are a few reasons why: (1) It’s literally...

InfoSec Articles (12/07/2022 – 12/19/2022)

Over the past two weeks, we saw “The Twelve Frauds of Christmas – Payment Diversion Fraud” which is a type of fraud where criminals target an individual to divert payments to criminal-controlled bank accounts. Also, we saw the “New MuddyWater...

InfoSec Articles (08/29/2022 – 09/12/2022)

Over the last two weeks, we saw the new BianLian ransomware gang, used subtle techniques to exploit, enumerate, and move laterally in victim networks to remain undetected and aggressively worked to counter Endpoint Detection & Response (EDR) protections during the...

Malware Hashes and Hash Functions

An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They very efficiently help identify malware samples and standardize the exchange of information among researchers, to name a couple of use...

InfoSec Articles (08/01/2022 – 08/16/2022)

Over the last two weeks, SC Media shared the top three email-based threats, what they have in common and how you can protect your organization. Also, more details about the Maui ransomware that has been used against US healthcare operations has been linked to...

InfoSec Articles (07/19/2022 – 08/01/2022)

Over the last two weeks, we saw the DUCKTAIL, infostealer Malware that is targeting Facebook Business Accounts. Also, Palo Alto release the new Incident Response Report 2022.For more articles, check out our #onpatrol4malware blog. The evolution of botnets and DDoS...