Mustang Panda, a Chinese nation-state actor, has been linked to sophisticated and targeted attacks against European foreign affairs entities since January 2023. Check Point researchers Itay Cohen and Radoslaw Madej uncovered a…
Category: English
Secure Data with ABE: 2020
In 2020, the world’s data totaled an astounding 59 zetabytes. To make use of this data, artificial intelligence and advanced data analytics must be employed. To ensure security, a new form of…
Ransomware Attack on SMBs
A Russian hacking group utilized a zero-day vulnerability in Kaseya VSA, a network management tool employed by managed service providers, to spread ransomware to thousands of small and medium-sized businesses around the…
Verified Mark Certificates: Impact on Digital Marketing
Google’s introduction of Verified Mark Certificates (VMCs) to Gmail has had a major effect on the world of digital marketing. VMCs allow businesses to insert their trademarked logos into Gmail’s avatar slot,…
Hypervisor Jackpotting: Risk Mitigation
Ransomware groups are increasingly targeting VMware ESXi hypervisors, a popular virtualization and management system, because they lack third-party agents or antivirus software, and there is a lack of network segmentation and publicly…
Lancefly Attacks Asia Sectors
Symantec is monitoring a new hacking group, called Lancefly, which has been attacking government, aviation, education, and telecom sectors in South and Southeast Asia since mid-2022. The attacks are using a powerful…
Qilin Affiliates’ Payouts
Group-IB has revealed details about the affiliate program of Qilin ransomware, which offers affiliates between 80 and 85% of the ransom payments, with the remaining 15-20% going to the operators. Affiliates receive…
Protecting Software Developers
Software developers have become the most important part of the computing industry due to the popular use of agile software. Cybercriminals are targeting APIs to find the weakest link and full stack…
Software Industry Adopts BOM
The software industry is making efforts to replicate the bill of materials (BOM) used by other industries to guarantee safety and security. President Biden’s executive order requires all software delivered to the…
Rise of Geacon Payloads
SentinelOne has noticed a rise in Geacon payloads on VirusTotal in recent months, likely as a result of malicious actors attempting to target Apple macOS systems. Geacon is a Go version of…