red teaming evasion technique to defeat and divert detection and prevention of security products.Mortar Loader performs encryption and decryption of …
Purple Fox Rootkit Discovered In Malicious Telegram Installers
After steady research, it has been discovered that there are fake Telegram installers online with malicious intent. By distributing a …
Norwegian Media Behemoth is the Latest Victim of Cybercrime
Amedia, a Norwegian print house, is the latest victim of cyberattacks that the company has termed an apparent “severe” cyberattack. …
Spray365 – Makes Spraying Microsoft Accounts (Office 365 / Azure AD) Easy Through Its Customizable Two-Step Password Spraying Approach
Spray365 is a password spraying tool that identifies valid credentials for Microsoft accounts (Office 365 / Azure AD). How is …
Alibaba Punished By The Chinese Government For Failing To Tell It About The Log4Shell Flaw First
The ministry of information technology in China has opted to pull back from its collaboration with Alibaba temporarily. The ministry …
SAP Addresses Log4Shell Vulnerability Patching in 20 Applications
Well over three billion devices run on Java worldwide. However, logging libraries are few, which is why many of the …
Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks
Every single day, hundreds of thousands of internet users are victims of some form of cyberattack. The number of hackers …
Microsoft’s Loop Project Management Software
Microsoft has been developing a project collaboration solution for enterprise projects. The Loop app is now accessible to Microsoft 365 …
Warning: Cyberattacks Are on The Rise! IKEA’S Emailing Compromised
Phishing is an email or SMS from an imposter pretending to be from a legitimate brand to induce people to …
The Government of Taiwan Faces 5 Million Cyber Threats Daily
A report from government agencies in Taiwan indicates that the country faces over five million cyber probes and attacks daily. …