Email:

Phone No.

Whatsapp

Blog

Microsoft Exchange Servers Hacked to Deploy BlackByte Ransomware
Microsoft Exchange Servers Hacked to Deploy BlackByte Ransomware
Microsoft Exchange Servers Hacked to Deploy BlackByte Ransomware
Microsoft Exchange Servers Hacked to Deploy BlackByte Ransomware

Microsoft Exchange Servers Hacked to Deploy BlackByte Ransomware

Microsoft Exchange Servers Hacked to Deploy BlackByte Ransomware The BlackByte ransomware gang is now breaching corporate networks by exploiting Microsoft Exchange servers using the ProxyShell vulnerabilities. ProxyShell is the name for a set of three Microsoft Exchange vulnerabilities that allow unauthenticated, remote code execution on the server when chained together. These vulnerabilities are listed below

Europol: 18k Money Mules Caught Laundering Money from Online Fraud

Europol: 18k Money Mules Caught Laundering Money from Online Fraud Europol has announced the arrest of 1,803 money mules out of 18,351 identified following an international money-laundering crackdown operation codenamed “EMMA 7.” As its name suggests, this was the seventh EMMA (European Money Mule Action) operation, with the first taking place in 2016. The operation relied

VirusTotal Collections Feature Helps Keep Neat IoC Lists

VirusTotal Collections Feature Helps Keep Neat IoC Lists Scanning service VirusTotal announced today a new feature called Collections that lets researchers create and share reports with indicators of compromise observed in security incidents. Indicators of compromise (IoCs) are pieces of data (files, digital addresses) uncovered when investigating cyberattacks, which can help researchers and companies detect

State-backed Hackers Increasingly Use RTF Injection for Phishing

State-backed Hackers Increasingly Use RTF Injection for Phishing Three APT hacking groups from India, Russia, and China, were observed using a novel RTF (rich text format) template injection technique in their recent phishing campaigns. This technique is a simple yet effective method to retrieve malicious content from a remote URL, and threat analysts expect it

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us