This week, I had a conversation with a new client who revealed that they are eager to solve various internal problems relating to their…
work from home
Are You a Cyber-Resilient Government Organization?
Being ready for technological and commercial changes in the 2020s means what exactly? How can your company recover quickly? A change in the standard…
No Shoes, Socks, or Malware Proxy Services Are Allowed!
There is currently something of a supply chain crisis engulfing the underground of the Internet as a result of the recent loss of numerous…
Emotet Downloader Document Execution Relies on Regsvr32
Executive Summary This document examines a recent Emotet infiltration and describes the system installation of the Emotet payload. The main findings are: Excel macros…
Government Ransomware Attack Reports Are Declining, But Appearances Can Be Deceiving
The Ransomware Task Force, a group of about 60 cybersecurity experts from the tech sector and the public sector, published a report earlier this…
How Mercenary Hackers Sway Litigation Battles
Indian cyber mercenaries are hacking parties involved in lawsuits around the world, according to a treasure trove of thousands of email records found by…
Black Basta Ransomware Gang Attacks Building Materials Major Knauf
The Knauf Group has disclosed that it was the victim of a cyberattack that interfered with its business operations and compelled its worldwide IT…
Top 5 Most Trusted Penetration Testing Companies in India
The Industrial Internet of Things and the Internet of Things will enable 200 billion objects and gadgets, including medical equipment, manufacturing equipment, cars, phones,…
Android virus called “Revive” poses as the 2FA app for BBVA bank.
The 2FA application necessary to access BBVA bank accounts in Spain is impersonated by a new Android banking malware called Revive. Instead of aiming…
Python libraries for PyPi were found sending unprotected websites using stolen AWS keys
The PyPI repository is home to a number of malicious Python packages that have been found to steal sensitive data like AWS credentials and…