Web applications and software frequently need user interaction to function properly. Users must be able to provide their email addresses and other personal information at […]
Tag: Cyber Attack
Adversary Infrastructure Report – Insikt Group
Insikt has released her 2022 Adversary Infrastructure Report. The report is based on its findings on the development of new harmful infrastructure for a variety […]
Beyond Fake INEC Portal, Threat Actor Targeting Users In 3 African Countries
Just some days ago, a fake INEC recruitment portal shows up in our space. And several media houses have reported INEC issuing a disclaimer around […]
The Tale of A Persistent Threat Actor – Monitoring OPs
The benefit that comes with having visibility (proactive monitoring) in and around your organization’s network perimeter cannot be underestimated in cyber defense and understanding the […]
Crypto Stealer Campaign – Targeting Crypto Platforms Extension in Browsers
What an unbelievable event for this user, who became a victim of a crypto stealer campaign when a sum of $900 worth of USDT meant […]
2022 | Q3 Report
From government-wide network attacks and breaches to compromise of employees’ accounts at large corporations for initial access leveraging MFA fatigue 😮. What a quarter! Here is our 2022 | […]