Email:

Phone No.

Whatsapp

Year: 2020

Windows Update Can Be Abused To Execute Malicious Files
Windows Update Can Be Abused To Execute Malicious Files
Windows Update Can Be Abused To Execute Malicious Files
Windows Update Can Be Abused To Execute Malicious Files

Windows Update Can Be Abused To Execute Malicious Files

Windows Update Can Be Abused To Execute Malicious Files The Windows Update client has just been added to the list of living-off-the-land binaries (LoLBins) attackers can use to execute malicious code on Windows systems. LoLBins are Microsoft-signed executables (pre-installed or downloaded) that can be abused by threat actors to evade detection while downloading, installing, or executing malicious code. They can

QBot Uses Windows Defender Antivirus Phishing Bait To Infect PCs

QBot Uses Windows Defender Antivirus Phishing Bait To Infect PCs The Qbot botnet uses a new template for the distribution of their malware that uses a fake Windows Defender Antivirus theme to trick you into enabling Excel macros. Qbot, otherwise known as QakBot or QuakBot, is Windows malware that steals bank credentials, Windows domain credentials,

Hackers Used VPN Flaws To Access US Govt Elections Support Systems

Hackers Used VPN Flaws To Access US Govt Elections Support Systems Government-backed hackers have compromised and gained access to US elections support systems by chaining together VPN vulnerabilities and the recent Windows CVE-2020-1472 security flaw. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) says that advanced persistent threat (APT) actors used this vulnerability chaining tactic to

BazarLoader Used to Deploy Ryuk Ransomware On High-Value Targets

BazarLoader Used to Deploy Ryuk Ransomware On High-Value Targets The TrickBot gang operators are increasingly targeting high-value targets with the new stealthy BazarLoader trojan before deploying the Ryuk ransomware. For years, the TrickBot gang has been using their trojan to compromise enterprise networks by downloading different software modules used for specific behavior such as stealing passwords, spreading

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us