SIEM as a Service
Home Search

malware - search results

If you're not happy with the results, please do another search
Lazarus Hackers Installing Windows Rootkit Using Dell Driver Bug

Lazarus Hackers Installing Windows Rootkit Using Dell Driver Bug

An attack utilizing the BYOVD (Bring Your Own Vulnerable Driver) method was observed recently by the experts at ESET. In this attack, the North...
Hackers Targeting Multiple Military & Weapons Contractor Companies Using Powershell Stagers

Hackers Targeting Multiple Military & Weapons Contractor Companies Using Powershell Stagers

Securonix Threat Labs has identified a new covert attack campaign targeting Military and Weapons Contractor companies including an F-35 Lightning II fighter aircraft components...
Warning!! New WhatsApp Zero-Day Bug Let Hackers Control The App Remotely

Warning!! New WhatsApp Zero-Day Bug Let Hackers Control The App Remotely

Two critical zero-day vulnerability that WhatsApp had been known to exploit was silently fixed by WhatsApp. As a result of these security flaws, attackers...
FARGO Ransomware Attacks MS-SQL Servers To Encrypt Internet Services

FARGO Ransomware Attacks MS-SQL Servers To Encrypt Internet Services

Cybersecurity experts at the ASEC (AhnLab Security Emergency Response Center) analysis team have recently warned that Microsoft SQL servers that are vulnerable to attacks...
Hackers Weaponize PuTTY SSH

Hackers Weaponize PuTTY SSH Client to Deploy Backdoors & Establish Communication Over WhatsApp

The adversaries from North Korea are deploying critical backdoors on the devices of targets by using trojanized versions of the PuTTY SSH client. Posing...
How Do You Defend Against Software Supply Chain Attacks?

How Do You Defend Against Software Supply Chain Attacks?

A supply chain attack occurs when an outsider gains access to your system through an external entity or source. Organizations' vulnerability can happen through...
5 Things You Can Do Today to Increase Your Cybersecurity

5 Things You Can Do Today to Increase Your Cybersecurity

There are a few things that you should do today rather than tomorrow when it comes to your cybersecurity. There are quite a few...
Two-Year Long DangerousSavanna Campaign Attack Financial and Banking Institutions

Two-Year Long DangerousSavanna Campaign Attack Financial and Banking Institutions

Over the past two years, a persistent malicious campaign dubbed "DangerousSavanna" has targeted major financial institutions and insurance companies. In Central and Western Africa, more...
North Korean APT Group Attacking Corporate Networks of Energy Providers

North Korean APT Group Attacking Corporate Networks of Energy Providers

Lazarus (APT38), the North Korean APT group is attacking the corporate networks of energy providers by exploiting the VMWare Horizon servers. While the corporate networks...
Five Tips to Protect Your Transactions: How to Avoid Fraud

Five Tips to Protect Your Transactions: How to Avoid Fraud

It seems that every time we turn around, there's a new way for fraudsters to steal our hard-earned money. In this blog post, we're...
SIEM as a Service

Recent Posts