SIEM as a Service
Lumma Stealer

Hackers Delivers Lumma Stealer Via Public GitHub Commands

Threat actors often target the popular code repository platform "GitHub" due to it's wide use, and features that this platform offers. Cybersecurity analysts at Gen DIgital recently discovered that threat actors are exploiting GitHub to...
The Role Of Blockchain In Enhancing Financial Security

The Role Of Blockchain In Enhancing Financial Security

We are always looking for better alternatives to improve our lives. And just like you would want to ensure your physical security, you also want to be sure you are financially safe. Blockchain’s makeup...
Authorities Warns Of North Korean Attackers Stealing Military Technologies

Authorities Warns Of North Korean Attackers Stealing Military Technologies

Threat actors target military technologies to gain a strategic advantage, access classified information, and compromise national security.  Recently, Germany's BfV and South Korea's NIS and CSA issued a second advisory on North Korean cyber actors...
Zoom Vulnerability Privilege Escalation

Critical Zoom Clients Flaw Let Attackers Escalate Privileges

A vulnerability classified as improper input validation was found in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows that could potentially allow an authenticated attacker to...
MOBILE And WIRELESS Mysterious ‘MMS Fingerprint’ Hack Used By Spyware Firm NSO Group Revealed

NSO Group’s Mysterious MOBILE & WIRELESS ‘MMS Fingerprint’ Hack Revealed

The "MMS Fingerprint" attack, a previously unidentified mobile network attack purportedly employed by spyware company NSO Group, is referenced in a single sentence in an agreement between NSO and Ghana's telecom regulator. Because the hack...
New Emansrepo Malware Weaponizing HTML Files To Attack Windows Users

New Emansrepo Malware Weaponizing HTML Files To Attack Windows Users

Emansrepo is a Python infostealer that was discovered by the FortiGuard Labs in August 2024 and has been disseminated through phishing emails containing fake purchase orders and invoices. It started its operation in November 2023,...
Navigating The Digital Storm – Unveiling The Power Of ITDR

Navigating The Digital Storm – Unveiling The Power Of ITDR

In the complicated maze of the digital age, where unexpected shocks lurk like malicious gremlins around every corner, organisations are yearning for a courageous hero to protect them from the approaching disaster. Enter IT...
Top 10 Most Dangerous Malware Of All Time

Top 10 Most Dangerous Malware Of All Time

Computer viruses are one of the most serious threats in the digital world. They can cause significant damage, destroy data, and even lead to major financial losses. Let's take a look back at some...
Maximise Profits In Ethereum Trading: Insights From A Crypto Trader’s Perspective

Maximise Profits In Ethereum Trading: Insights From A Crypto Trader’s Perspective

Diving into the world of Ethereum trading has been one of the most exhilarating experiences of my financial journey. With its dynamic market and endless opportunities, Ethereum offers traders like me a chance to...
Researchers Leverage ChatGPT For Enhanced Cryptography Misuse Detection

Researchers Leverage ChatGPT For Enhanced Cryptography Misuse Detection

Researchers from Technische Universität Clausthal in Germany and CUBE Global in Australia have explored the potential of ChatGPT, a large language model developed by OpenAI, to detect cryptographic misuse. This research highlights how artificial intelligence...
SIEM as a Service

Recent Posts