What is commonly referred to as the Gig workforce has massively revolutionized global work culture over the last few years, especially in the tech industry […]
How Legacy Systems have become Soft Landing for Threat Actors.
A legacy VPN system gave access to the ransomware gang that breached Colonial Pipeline and made them pay a whooping sum of $4.4 million dollar […]
Defense Evasion – Malware In Bitmap
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting […]
Top Breaches of the last 5 years.
Cyberattacks have become a common feature of today’s interconnected world. As more organizations transition their data operations online, the sheer volume of attacks has increased […]
New ‘unc0ver’ Tool Can Jailbreak (root) All iPhone Models Running latest iOS
A popular jailbreaking tool called “unc0ver” has been updated to support iOS 14.3 and earlier releases, thereby making it possible to unlock almost every single […]
An Analysis of the Nefilim Ransomware From TrendMicro
Nefilim is among the notable ransomware variants that use double extortion tactics in their campaigns. First discovered in March 2020, Nefilim threatens to release victims’ stolen data to coerce them into paying the ransom. Aside from its use […]