The benefit that comes with having visibility (proactive monitoring) in and around your organization’s network perimeter cannot be underestimated in cyber defense and understanding the […]
Category: Malware
Crypto Stealer Campaign – Targeting Crypto Platforms Extension in Browsers
What an unbelievable event for this user, who became a victim of a crypto stealer campaign when a sum of $900 worth of USDT meant […]
Threats Targeting Linux-Based Multi-Cloud Environments
In this blog post, we will be looking at the VMware Threat Analysis Unit Report which is focused on exposing malware in Linux-based multi-cloud environments. […]
When they come with Cobalt Strike, just know it is serious!
A few weeks back we put out a tweet indicating there were an ongoing campaign targeting organisations’ networks in #Nigeria. This blog post will be […]
Ransomware – Inhibiting System Recovery.
We saw a lot of incidents that caught major headlines in 2021 to be ransomware. And not just that, many ransomware RAAS operators groups emerged […]
Reverse Engineering Malware Encryption
This is an analysis of the file malware201 in the RE101 reverse engineering challenge and the custom encryption algorithm it uses to hide strings. Though […]