Email:

Phone No.

Whatsapp

Day: January 6, 2022

‘Elephant Beetle’ Spends Months in Victim Networks to Divert Transactions
‘Elephant Beetle’ Spends Months in Victim Networks to Divert Transactions
‘Elephant Beetle’ Spends Months in Victim Networks to Divert Transactions
‘Elephant Beetle’ Spends Months in Victim Networks to Divert Transactions

‘Elephant Beetle’ Spends Months in Victim Networks to Divert Transactions

‘Elephant Beetle’ Spends Months in Victim Networks to Divert Transactions A financially-motivated actor dubbed ‘Elephant Beetle’ is stealing millions of dollars from organizations worldwide using an arsenal of over 80 unique tools and scripts. The group is very sophisticated and patient, spending months studying the victim’s environment and financial transaction processes, and only then moves

Microsoft Code-Sign Check Bypassed to Drop Zloader Malware

Microsoft Code-Sign Check Bypassed to Drop Zloader Malware A new Zloader campaign exploits Microsoft’s digital signature verification to deploy malware payloads and steal user credentials from thousands of victims from 111 countries. The campaign orchestrated by a threat group known as MalSmoke appears to have started in November 2021, and it’s still going strong, according

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us