How would you react if you found this in your company inbox? You may want to ignore and many will take the fear bait and […]
Category: Incident Response
What You Get When Input Validation is Missing – Shells, Miner & More
Web applications and software frequently need user interaction to function properly. Users must be able to provide their email addresses and other personal information at […]
CyberPlural Annual Report 2022
We started into the year by providing quarterly reports of what was happening with the cyber threat landscape based on what we are seeing across the globe. […]
The Tale of A Persistent Threat Actor – Monitoring OPs
The benefit that comes with having visibility (proactive monitoring) in and around your organization’s network perimeter cannot be underestimated in cyber defense and understanding the […]
Crypto Stealer Campaign – Targeting Crypto Platforms Extension in Browsers
What an unbelievable event for this user, who became a victim of a crypto stealer campaign when a sum of $900 worth of USDT meant […]
Agent Tesla (RAT) Operators Arrested In Nigeria
Just a few days back, three Nigerians were arrested in the INTERPOL operation codename Killer Bee. The arrests follow the publication of an INTERPOL Cyber […]