[ New Immediate Threat Discoverd ] BazarCall Method: Call Centers Help Spread BazarLoader Malware

NEW IMMEDIATE THREAT DISCOVERED BazarCall Method: Call Centers Help Spread BazarLoader Malware BazarLoader (sometimes referred to as BazaLoader) is malware that provides backdoor access to an infected Windows host.After a client is infected, criminals use this backdoor access to send follow-up malware, scan the environment and exploit other vulnerable hosts on the network. The threat… Continue reading [ New Immediate Threat Discoverd ] BazarCall Method: Call Centers Help Spread BazarLoader Malware

Threat Actors Use MSBuild to Deliver RATs Filelessly

A campaign was discovered, in which threat actors used Microsoft Build Engine (MSBuild) to filelessly deliver Remcos remote access tool (RAT) and password-stealing malware commonly known as RedLine Stealer. The threat actors began infiltrating Remcos RAT, Quasar RAT, and RedLine Stealer payloads onto their victims’ computers last month. Once they are installed, they can be… Continue reading Threat Actors Use MSBuild to Deliver RATs Filelessly

[ New Immediate Threat Discoverd ] AHK RAT loader in unique delivery campaigns

There is a unique and ongoing RAT delivery campaign that started in February of this year. This campaign is unique in that it heavily uses the AutoHotKey scripting language-a fork of the AutoIt language that is frequently used for testing purposes.  Starting in February, at least four versions of the RAT delivery campaign were identified, each… Continue reading [ New Immediate Threat Discoverd ] AHK RAT loader in unique delivery campaigns

Improved User Experience for Remote Access

In the “Always On” world of today, the user expects technology services to work in a seamless fashion with little or no effort required to access corporate resources. This is especially true in the case of increased mobile and remote workers who are rarely, if ever, in the corporate office and yet depend on company… Continue reading Improved User Experience for Remote Access

Bizarro banking Trojan expands its attacks to Europe

Bizarro is yet another banking Trojan family originating from Brazil that is now found in other regions of the world. Users are being targeted in Spain, Portugal, France and Italy. Attempts have now been made to steal credentials from customers of 70 banks from different European and South American countries. Following in the footsteps of Tetrade, Bizarro is… Continue reading Bizarro banking Trojan expands its attacks to Europe

How you can test the effectiveness of your security controls of your VPN deployment?

Benefits of Working Remotely As the Novel Coronavirus (COVID-19) has entire countries declaring national emergencies and recommending social distancing; more companies than ever are unexpectedly finding that they must allow employees to work remotely in order to limit the speed of the virus spreading throughout our communities.  Remote work has a great number of benefits… Continue reading How you can test the effectiveness of your security controls of your VPN deployment?

HOTPin Now Supports TLS 1.2

TLS 1.2 is now compatible with Celstix HOTPin Authentication server.  Celestix HOTPin Authentication requires TLS 1.2 when installed on Windows Server 2016 or 2019 and earlier windows versions. TLS 1.2 offers major improvements over the older version, TLS 1.1. The most essential improvement, however, is in the encryption protocol. TLS 1.2 allows the use of… Continue reading HOTPin Now Supports TLS 1.2

Immediate Threat: WinRAR Path Traversal

To keep on giving our users the necessary tools to boost their cybersecurity posture, the Cymulate Research Lab is constantly searching for new global attacks that can compromise organizations. By adding the latest in-the-wild detected threats, we keep our BAS platform up-to-date. A unique (and highly popular) feature in our platform is the Immediate Threat assessment, which allows organizations… Continue reading Immediate Threat: WinRAR Path Traversal

12 Reasons Celestix WebFilter is a great alternative to Cisco OpenDNS

1. Support Support from Celestix is hands on and world class, including contact with a qualified engineer through the entire process – this includes full support during the trial period, migration help and on-going free technical support when you become a customer. OpenDNS don’t offer you this. With Celestix there are no additional support costs… Continue reading 12 Reasons Celestix WebFilter is a great alternative to Cisco OpenDNS

The Way You Type as Two-Factor Authentication

Among multi-factor authentication mechanisms, two-factor authentication (2FA) has become kind of an industry standard. 2FA generally uses a combination of two factors from the following: 1. Something users know (a password or a PIN) 2. Something they have (a card or a soft token) 3. Something users are (their voice, handwriting, or any biometrics data)… Continue reading The Way You Type as Two-Factor Authentication