Email:

Phone No.

Whatsapp

Blog

Google Exposes Tactics of a Conti Ransomware Access Broker
Google Exposes Tactics of a Conti Ransomware Access Broker
Google Exposes Tactics of a Conti Ransomware Access Broker
Google Exposes Tactics of a Conti Ransomware Access Broker

Google Exposes Tactics of a Conti Ransomware Access Broker

Google Exposes Tactics of a Conti Ransomware Access Broker Google’s Threat Analysis Group has exposed the operations of a threat actor group dubbed “EXOTIC LILY,” an initial access broker linked to the Conti and Diavol ransomware operations. This particular group was first spotted exploiting a zero-day vulnerability in Microsoft MSHTML (CVE-2021-40444), so it sparked the

Microsoft Reminds of Internet Explorer’s Looming Demise in June

Microsoft Reminds of Internet Explorer’s Looming Demise in June Microsoft has reminded Windows customers today that they’ll finally retire the Internet Explorer 11 web browser from some Windows 10 versions in June and replace it with the new Chromium-based Microsoft Edge. After Internet Explorer is retired, Microsoft will still support legacy Internet Explorer-based websites and applications

Unsecured Microsoft SQL, MySQL Servers Hit by Gh0stCringe Malware

Unsecured Microsoft SQL, MySQL Servers Hit by Gh0stCringe Malware Hackers target poorly secured Microsoft SQL and MySQL database servers to deploy the Gh0stCringe remote access trojans on vulnerable devices. Gh0stCringe, aka CirenegRAT, is a variant of Gh0st RAT malware that was most recently deployed in 2020 Chinese cyber-espionage operations but dates as far back as 2018. In

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us