Look Inside Ransomware Gang Through Conti Leaks
2022-03-19
Look Inside Ransomware Gang Through Conti Leaks

Conti gang is one of the largest cybercrime syndicates in the world. Third-party blockchain analysis

Ways to Prevent Cyber Crime Even as IoT Technology Becomes Increasingly Prevalent in 2022
2022-03-01
Ways to Prevent Cyber Crime Even as IoT Technology Becomes Increasingly Prevalent in 2022

Ways to Prevent Cyber Crime Even as IoT Technology Becomes Increasingly Prevalent in 2022 As we move

Cyber Threat Landscape Expands with State-Sponsored Cyber Attackers
2022-02-19
Cyber Threat Landscape Expands with State-Sponsored Cyber Attackers

Cyber Threat Landscape Expands with Collaboration Between State-Sponsored Groups By CYFIRMA Research

Understanding Cyber Risk Related to Mobile Apps | Android Banking Trojan – Red Alert 2.0
2021-12-27
Understanding Cyber Risk Related to Mobile Apps | Android Banking Trojan – Red Alert 2.0

Understanding Cyber Risk Related to Mobile Apps | Android Banking Trojan – Red Alert 2.0  

Top 3 Ransomware Entry Points Used by Cyber Criminals
2021-12-07
Top 3 Ransomware Entry Points Used by Cyber Criminals

Top 3 Ransomware Entry Points Used by Cyber Criminals   In the past 2 years, ransomware attacks

TECHNICAL ANALYSIS OF SMOKELOADER MALWARE
2021-11-10
TECHNICAL ANALYSIS OF SMOKELOADER MALWARE

Risk Score: 8 Confidence Level: High Suspected Malware: SmokeLoader Malware Function: Mainly act to

AvosLocker is Turning the Double-Extortion Ransomware Scheme Lethal
2021-10-12
AvosLocker is Turning the Double-Extortion Ransomware Scheme Lethal

Subscribe for Latest Updates AvosLocker is Turning the Double-Extortion Ransomware Scheme Lethal By

Dridex is Back – This Time on Your Slack
2021-10-03
Dridex is Back – This Time on Your Slack

Dridex is Back – This Time on Your Slack A modified version of the banking trojan Dridex – named

What to Look for When Choosing An Attack Surface Management Tool
2021-09-21
What to Look for When Choosing An Attack Surface Management Tool

What to Look for When Choosing An Attack Surface Management Tool Attack surface management (ASM) is

CYFIRMA Technical Research on Leviathan_CobaltStrike
2021-09-03
CYFIRMA Technical Research on Leviathan_CobaltStrike

Leviathan_CobaltStrike Cobalt Strike is a penetration testing tool that allows an attacker to deploy