What is Zero Trust Security Model?
The buzz around Zero Trust is picking up pace as companies shift to a remote working model. The inadequacy of traditional security models has put the spotlight on neoteric security conceptions like…
The buzz around Zero Trust is picking up pace as companies shift to a remote working model. The inadequacy of traditional security models has put the spotlight on neoteric security conceptions like…
Recent campaigns involved exploits against Exchange and MySQL servers. Group has heavy focus on telecoms sector. Symantec, part of Broadcom Software, has linked the recently discovered Sidewalk backdoor to the…
In early 2021, supply chain attacks, such as the SolarWinds and Accellion incidents, made headlines. Cyber attackers exploited weak security protocols at third-party vendors to penetrate an organization’s networks and systems. Supply…
https://www.nytimes.com/2021/06/03/us/politics/ransomware-cybersecurity-infrastructure.html?smid=url-share
In a world where every device is becoming smarter and more connected, security emerges as a major pain point, and one of the key considerations. And, the latest Kaseya Supply…
NEW IMMEDIATE THREAT DISCOVERED BazarCall Method: Call Centers Help Spread BazarLoader Malware BazarLoader (sometimes referred to as BazaLoader) is malware that provides backdoor access to an infected Windows host.After a…
A campaign was discovered, in which threat actors used Microsoft Build Engine (MSBuild) to filelessly deliver Remcos remote access tool (RAT) and password-stealing malware commonly known as RedLine Stealer. The…
There is a unique and ongoing RAT delivery campaign that started in February of this year. This campaign is unique in that it heavily uses the AutoHotKey scripting language-a fork of…
In the “Always On” world of today, the user expects technology services to work in a seamless fashion with little or no effort required to access corporate resources. This is…
Bizarro is yet another banking Trojan family originating from Brazil that is now found in other regions of the world. Users are being targeted in Spain, Portugal, France and Italy. Attempts have…