SIEM as a Service
SideWinder State-Sponsored Hacker Group

Notorious State-Sponsored Hacker Group Stealthy Infrastructure Uncovered

Group-IB's cybersecurity researchers made a significant discovery, revealing undisclosed attack infrastructure employed by the highly active state-sponsored group SideWinder. Their targets mainly encompassed entities situated in:-  Pakistan China In a collaborative report, cybersecurity firms Group-IB and Bridewell...
Authorities Warns Of North Korean Attackers Stealing Military Technologies

Authorities Warns Of North Korean Attackers Stealing Military Technologies

Threat actors target military technologies to gain a strategic advantage, access classified information, and compromise national security.  Recently, Germany's BfV and South Korea's NIS and CSA issued a second advisory on North Korean cyber actors...
Hackers Leveraging CHM Files To Attack Users With Password-Protected Zip Files

Hackers Leveraging CHM Files To Attack Users With Password-Protected Zip Files

⁤Hackers abuse CHM files because they can embed malicious scripts or code within them. Windows systems often trust and execute these files without many security checks. ⁤ When the CHM file is opened, it enables...
Critical Splunk Vulnerability Exploited Using Crafted GET Commands

Critical Splunk Vulnerability Exploited Using Crafted GET Commands

Splunk Enterprise is one of the many applications Splunk offers for security and monitoring purposes. It allows organizations to search, analyze and visualize data which can help to respond to incidents in a better way....
VS Code Marketplace Flaw Let Attackers Include Malicious Extensions

VS Code Marketplace Flaw Let Attackers Include Malicious Extensions

Researchers identified security vulnerabilities in the VS Code Marketplace that could be exploited by malicious actors, as these flaws allowed extensions with malicious dependencies to gain credibility (through high install numbers) and access to...
Hacking GitHub Repositories Via Race Condition That leads To Remote Code Execution

GitHub Vulnerability “ArtiPACKED” Trigger RCE Exploit to Hack Repositories

The research identifies a critical security vulnerability in GitHub Actions artifacts, enabling unauthorized access to tokens and secrets within CI/CD pipelines.  Misconfigured workflows in major organizations' public repositories exposed sensitive information, potentially compromising cloud environments...
SmokeLoader – A Modular Malware With Range Of Capabilities

SmokeLoader – A Modular Malware With Range Of Capabilities

Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits. Besides this malware is also helpful in conducting cyber warfare or receptive intelligence by the nation-state...
NSA CISA AI Security Guidelines

NSA, CISA Released Guidance And Best Practices To Secure The AI

In an era where artificial intelligence (AI) systems are becoming increasingly integral to our daily lives, the National Security Agency’s Artificial Intelligence Security Center (NSA AISC) has taken a significant step forward in enhancing...
SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

Infostealer malware is a type of malicious software designed to infiltrate computer systems and extract sensitive information. Once the data is collected, it is sent to remote servers controlled by threat actors and often...
Hackers Attempted To Takeover JavaScript Project From OpenJS Foundation

Hackers Attempted To Takeover JavaScript Project From OpenJS Foundation

Attackers tried to take over the JavaScript project from OpenJS Foundation, which is home to JavaScript projects utilized by billions of websites globally.  This is similar to the incident that was recently disclosed and targeted at...
SIEM as a Service

Recent Posts

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution

A critical vulnerability in Microsoft's Remote Desktop Gateway (RD Gateway) that could allow attackers to execute malicious code on affected systems remotely. The vulnerability, tracked...