Email:

Phone No.

Whatsapp

Blog

Microsoft: Nobelium Uses Custom Malware to Backdoor Windows Domains
Microsoft: Nobelium Uses Custom Malware to Backdoor Windows Domains
Microsoft: Nobelium Uses Custom Malware to Backdoor Windows Domains
Microsoft: Nobelium Uses Custom Malware to Backdoor Windows Domains

Microsoft: Nobelium Uses Custom Malware to Backdoor Windows Domains

Microsoft: Nobelium Uses Custom Malware to Backdoor Windows Domains Microsoft has discovered new malware used by the Nobelium hacking group to deploy additional payloads and steal sensitive info from Active Directory Federation Services (AD FS) servers. Nobelium, the threat actor behind last year’s SolarWinds supply-chain attack that led to the compromise of several US federal

Ethereum Dev Admits To Helping North Korea Evade Crypto Sanctions

Ethereum Dev Admits To Helping North Korea Evade Crypto Sanctions Cryptocurrency expert Virgil Griffith pled guilty today to assisting the Democratic People’s Republic of Korea in evading U.S. sanctions by conspiring to violate the International Emergency Economic Powers Act (IEEPA) and Executive Order 13466. Griffith, who worked as a special projects dev and researcher for the Ethereum Foundation,

QNAP Fixes Critical Bugs in QVR Video Surveillance Solution

QNAP Fixes Critical Bugs in QVR Video Surveillance Solution Network-attached storage (NAS) maker QNAP has patched its QVR video management system against two critical-severity issues that could be exploited to run arbitrary commands. QNAP promotes its QVR software as a professional solution that allows real-time video monitoring, recording, playback, and alarm notifications when coupled with

New Malware Steals Steam, Epic Games Store, and EA Origin Accounts

New Malware Steals Steam, Epic Games Store, and EA Origin Accounts A new malware sold on dark web forums is being used by threat actors to steal accounts for multiple gaming platforms, including Steam, Epic Games Store, and EA Origin. Kaspersky security researchers who spotted the new trojan in March dubbed it BloodyStealer and found that it’s capable

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us