Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

0
In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the...

Cyber Security is Not an Easy Game for CISO – It’s an Absolute End...

0
Let’s breakdown the little pieces and the critical dots to connect in the perspective of a CISO and a point-of-view from CyberSpace.The threats...

Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor

0
Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard to detect...

Most Important Steps to Prevent Your Organization From Identity Theft – Detailed Explanation

0
Identity theft by Identity Thief is the ponder utilization of another person's character, it is a genuine wrongdoing(a serious crime). Identity Thief utilizes data about anybody without...

Proofpoint Q2 Threat Report – Ransomware Returns, Growth in Social Engineering and Email Fraud

0
According to Proofpoint Q2 Threat Report, the malicious message volume increased by 36% in the second quarter of 2018 and the ransomware returns back...

Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code

0
A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT...

Hackers Increasing the use of “Command Line Evasion and Obfuscation” to Spread Advance...

0
Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and obfuscation technique give more...

A Malvertiser called “RoughTed” Bypass Ad-blocker and Get Half a Billion visits in 3...

0
A Malvertiser called "RoughTed" Successfully Bypass the Ad-Blockers and Delivery Malicious  Payloads into the visitors Operating Systems and Browsers which is used to visit...

200 Unique Android Apps Discovered with Backdoor Called “MilkyDoor” Downloaded by Nearly 1...

0
An Android Backdoor called  MilkyDoor Infected with More than 200 Apps in Play store  which contains Nealy 1 million Downloads .According to the Trend...

Ask.com Toolbar Compromised Twice in 2 Months , Second Attack Installed RAT

0
Ask Partner Network (APN) has been compromised twice within 2 month since 2016 November. Researcher's Discovered deliver malware to computers running the Ask.com Toolbar.First...

Complete Free Website Security Check

Website

Recent Posts