Understanding Cyber Risk Related to Mobile Apps | Android Banking Trojan – Red Alert 2.0 The malware, Red Alert 2.0, tricks users into downloading it by hiding in third-party…
Top 3 Ransomware Entry Points Used by Cyber Criminals In the past 2 years, ransomware attacks have grown by leaps and bounds with the average ransom demand surging from…
Risk Score: 8 Confidence Level: High Suspected Malware: SmokeLoader Malware Function: Mainly act to download other malware and as Information Stealer. Threat actor Associations: Association with Russians Other Malwares related…
Subscribe for Latest Updates AvosLocker is Turning the Double-Extortion Ransomware Scheme Lethal By CYFIRMA Research The world of ransomware double-extortion schemes is changing. The extortion model, which started back in…
Dridex is Back – This Time on Your Slack A modified version of the banking trojan Dridex – named DoppelDridex – is being delivered via payloads staged on Slack and…
What to Look for When Choosing An Attack Surface Management Tool Attack surface management (ASM) is one of the most essential components of IT security. Any software, hardware, SaaS, and…
Leviathan_CobaltStrike Cobalt Strike is a penetration testing tool that allows an attacker to deploy an agent named 'Beacon' on the target machine. The beacon includes a variety of functions like…
EXECUTIVE SUMMARY Russian Cybercriminals – FIN11 Group is suspected of leveraging common target infrastructure indicators (IoCs) across two major campaigns attributed to them known as EmB0 and Topaz Stone, which…
By Mihir Bagwe, Snr Technical Writer @ CISO Mag The Cyber-readiness Gap Here’s a quick recap of what we read in the first two parts of this series. We saw…
By Mihir Bagwe, CISO Mag In the first part of this series, we have already seen why small and medium businesses (SMBs) are the backbone of modern economies and hold…
Your iFrame Code