What is commonly referred to as the Gig workforce has massively revolutionized global work culture over the last few years, especially in the tech industry […]
How Legacy Systems have become Soft Landing for Threat Actors.
A legacy VPN system gave access to the ransomware gang that breached Colonial Pipeline and made them pay a whooping sum of $4.4 million dollar […]
Defense Evasion – Malware In Bitmap
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting […]
Top Breaches of the last 5 years.
Cyberattacks have become a common feature of today’s interconnected world. As more organizations transition their data operations online, the sheer volume of attacks has increased […]
Attackers Abusing Windows RDP servers to amplify DDoS attacks
Researchers from Netscout reported that attackers could be abused to launch UDP reflection/amplification attacks with an amplification ratio of 85.9:1 when enabled on UDP/3389, “When […]
Experts detail TTP’s of Recent Remotely Exploitable Windows Vulnerability
More details have emerged about a security feature bypass vulnerability in Windows NT LAN Manager (NTLM) that was addressed by Microsoft as part of its […]