SIEM as a Service
Cyber Security Trends

Top Cyber Security Trends Expected In 2020

Cyber Security is vital for every business, it is import to protect your business against cyber attacks, a single cyber attack could cause serious damage. Cyber Security is the top priority for every organization...

Hundreds of Fake Online Shoe Stores Injected With Credit Card Skimmer To Steal User...

Hundreds of online web stores that sell counterfeit goods are affected by credit card skimmer that aimed to steal the customer credit card details. Several counterfeit online shoe stores offer great deals for the popular...
Military Veterans

Hackers Hosting Fake Military Veterans Website to Drop Malware

The website claims that the desktop app is completely free by directing to users via three links but the app is totally fake and it acts as an installer.

State-Sponsored APT Hackers From China, North Korea, Iran Focusing to Develop Android & iOS...

Mobile threats emerge as mobile devices become part of our day to day life. Exploiting mobile devices gives all-in-one means to targeted users' sensitive data. By hijacking mobile, attackers can gain access to various sensitive...
Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Nowadays, the phishing attacks are increasing at an alarming rate, and these attacks are drastically affecting and harming the business organization. Recently, the cybersecurity researchers have detected a phishing campaign in which the attackers...
Dridex Network Attack Campaign

Dridex Network Attack Campaign Delivered by Cutwail Botnet and Poisonous PowerShell Scripts

The IBM X-Force threat intelligence team has recently reported that they are continuously witnessing a huge increase in Dridex-related network attacks, and all these attacks are executed by the Cutwail botnet.  According to the cybersecurity...
Hackers Abuse Microsoft Build Engine

Hackers Abuse Microsoft Build Engine to Deliver Password-Stealing Malware Filelessly

Anomali Threat Research recognized a campaign in which threat actors used Microsoft Build Engine (MSBuild) to filelessly deliver Remcos remote access tool (RAT) and password-stealing malware commonly known as RedLine Stealer. Threat actors used MSBuild,...
RAT Uses Autohotkey

A New Unique RAT Heavily Uses The Autohotkey Scripting Language On An Ongoing Malware...

The Morphisec Labs team has tracked a unique and ongoing RAT delivery campaign that heavily uses the AutoHotKey scripting language, a fork of the AutoIt language that is frequently used for testing purposes. Researchers identified...
Kubernetes Clusters Compromised

Over 50,000 Ips Across Multiple Kubernetes Clusters Were Compromised By the TeamTNT Threat Actors

Researchers from Trend Micro disclosed that close to 50,000 IPs were compromised across multiple Kubernetes clusters in a cryptojacking campaign conducted by the TeamTNT group. Kubernetes, developed and backed by Google, is one of the...
Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Lazarus APT is one of the most sophisticated North Korean Threat Actors that has been active since at least 2009. This actor is known to target the U.S., South Korea, Japan, and several other countries....
SIEM as a Service

Recent Posts

Production Line Cameras Vulnerabilities Let Attackers Stop The Recordings

Critical security vulnerabilities have been identified in industrial camera systems widely deployed across Japanese manufacturing facilities, allowing malicious actors to remotely access live footage...