Email:

Phone No.

Whatsapp

Blog

Phishing Emails Deliver Spooky Zombie-themed MirCop Ransomware
Phishing Emails Deliver Spooky Zombie-themed MirCop Ransomware
Phishing Emails Deliver Spooky Zombie-themed MirCop Ransomware
Phishing Emails Deliver Spooky Zombie-themed MirCop Ransomware

Phishing Emails Deliver Spooky Zombie-themed MirCop Ransomware

Phishing Emails Deliver Spooky Zombie-themed MirCop Ransomware A new phishing campaign pretending to be supply lists infects users with the MirCop ransomware that encrypts a target system in under fifteen minutes. The actors begin the attack by sending an unsolicited email to the victim, supposedly following up on a previous arrangement about an order. The

Popular ‘coa’ NPM Library Hijacked to Steal User Passwords

Popular ‘coa’ NPM Library Hijacked to Steal User Passwords Popular npm library ‘coa’ was hijacked today with malicious code injected into it, ephemerally impacting React pipelines around the world. The ‘coa’ library, short for Command-Option-Argument, receives about 9 million weekly downloads on npm, and is used by almost 5 million open source repositories on GitHub.

Cisco Fixes Hard-coded Credentials and Default SSH Key Issues

Cisco Fixes Hard-coded Credentials and Default SSH Key Issues Cisco has released security updates to address critical security flaws allowing unauthenticated attackers to log in using hard-coded credentials or default SSH keys to take over unpatched devices. CISA also encouraged users and administrators today to review Cisco’s advisories and apply all the necessary updates to block attempts

Microsoft Exchange ProxyShell Exploits Used to Deploy Babuk Ransomware

Microsoft Exchange ProxyShell Exploits Used to Deploy Babuk Ransomware A new threat actor is hacking Microsoft Exchange servers and breaching corporate networks using the ProxyShell vulnerability to deploy the Babuk Ransomware. The ProxyShell attacks against vulnerable Microsoft Exchange servers started several months ago, with LockFile and Conti being among the first ransomware groups to exploit them. The name Tortilla is

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us