Have Any Questions?
Call Now +353-1-5666-640
Caption aligned here

Blog Full Both Sidebar

A malvertising campaign is leveraging trojanized installers for popular software such as Google Chrome and Microsoft Teams to drop a backdoor called Oyster (aka Broomstick and CleanUpLoader). That’s according to findings from Rapid7, which identified lookalike websites hosting the malicious payloads that users are redirected to after...
Read More
Created by John Tuckner and the team at automation and AI-powered workflow platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their automation capabilities and respond more effectively to incidents. A customizable, vendor-agnostic tool featuring lists of automation...
Read More
Cybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan using a custom backdoor. Dubbed PHANTOM#SPIKE by Securonix, the unknown threat actors behind the activity have leveraged military-related phishing documents to activate the infection sequence. “While there are...
Read More
A previously undocumented Chinese-speaking threat actor codenamed SneakyChef has been linked to an espionage campaign primarily targeting government entities across Asia and EMEA (Europe, Middle East, and Africa) with SugarGh0st malware since at least August 2023. “SneakyChef uses lures that are scanned documents of government agencies, most...
Read More
Russian organizations have been targeted by a cybercrime gang called ExCobalt using a previously unknown Golang-based backdoor known as GoRed. “ExCobalt focuses on cyber espionage and includes several members active since at least 2016 and presumably once part of the notorious Cobalt Gang,” Positive Technologies researchers...
Read More
1 2 3

Octalas Secure

Security-hardened smartphone designed to deliver unparalleled privacy and security, specifically tailored for professionals in security, law enforcement, and government sectors.

Recent Articles

November 15, 2024
New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns
November 15, 2024
Comprehensive Guide to Building a Strong Browser Security Program
November 15, 2024
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails

Tag Cloud

Post Category