SIEM as a Service
Phishing Attack Prevention Checklist

Phishing Attack Prevention Checklist – A Detailed Guide For 2024

Phishing attacks are online scams in which hackers pretend to represent reliable organizations to trick victims into disclosing private information like passwords or credit card numbers. Attackers frequently use phony emails, texts, and websites to...
North Korean Hackers Attacking Job Seekers To Deploy Multiple Malware

North Korean Posing as Recruiters to Attack Job Seekers Device

Hackers target job seekers primarily for financial gain and to obtain sensitive personal information.  Many job seekers are vulnerable due to their enthusiasm for finding employment, which exposes them to phishing scams and fake job...
Zendesk Email Spoofing Vulnerability

Zendesk Email Spoofing Flaw Let Attackers Gain Access To Support Tickets

A severe vulnerability in Zendesk, a widely used customer service tool, has been exposed, allowing attackers to gain unauthorized access to sensitive support tickets of numerous Fortune 500 companies. The flaw, discovered by a...
smishing Attacks

Beware of Smishing Attacks Aimed to Steal Personal Information

There has been an increase in the number of robotext scams in recent months, which has prompted the Federal Communications Commission (FCC) to issue a warning. Scammers are increasingly using robotext scams to trick their...
CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine

CRON#TRAP Campaign Attacking Windows Machine With Weaponized Linux VMs

Weaponized Linux virtual machines are used for offensive cybersecurity purposes like "penetration testing" or "exploiting vulnerabilities." These setups often use the tools and frameworks that are designed for ethical hacking. Securonix researchers recently detected CRON#TRAP...
Two-Step Phishing Attacks

Hackers Abuse Microsoft Office Forms to Launch Two-Step Phishing Attacks

Cybercriminals are increasingly using Microsoft Office Forms to launch sophisticated two-step phishing attacks. At present, certain individuals are being tricked into divulging their Microsoft 365 (M365) login information through Office Forms. Threat actors use the technique...
Hackers Using Weaponized Word Documents In QR Code Phishing Attacks

Hackers Using Weaponized Word Documents In QR Code Phishing Attacks

Hackers often abuse weaponized Word docs, as they can contain macros that contain or exploit flaws inside those Word files to run destructive code upon being opened by the intended victims. It enables an attacker...
Darkgate Malware Weaponizing XLSX, HTML And PDF To Attack Windows Machines

Darkgate Malware Weaponizing XLSX, HTML, & PDF To Attack Windows Machines

Hackers often target XLSX, HTML, and PDF files as they are widely used, and their trustable file formats also attract them. This makes it easier to deliver them successfully to recipients who may not be...
Malicious PDF Microsoft 2FA Warning

Beware Of Malicious PDF Files That Mimic Microsoft 2FA Security Update

Malware authors are exploiting the growing popularity of QR codes to target users through PDF files, where these malicious PDFs, often delivered via email disguised as faxes, contain QR codes that trick users into...
Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins

Hackers Attacking Sporting Events Via Fake Domains To Steal Logins

Cybercriminals leverage high-profile events, such as global sporting championships, by registering fake domains to launch phishing and scam attacks. Researchers uncover suspicious domain registration campaigns, especially when event-specific terms or phrases are used in recently...
SIEM as a Service

Recent Posts