Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...
Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...
On 27 August 2021, cybersecurity researchers discovered Colibri loader malware being sold on an underground Russian forum....
A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...
Based on a study by CloudSEK researchers, cryptocurrency related cyber attacks accounted for 2.9% of all reported...
We continue to track the behaviour of the DJVU/STOP ransomware in this 2nd part of the 2...
We delve into the modus operandi of the DJVU/STOP ransomware, its technicalities and features, how it identifies...
This article provides an overview of SMS Ranger and how OTP bots are exploited by threat actors.
Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...
The group has actively targeted the healthcare industry and first responder networks when COVID was at its...
We discuss the various components of a complex Selenium Grid architecture to help readers understand how singular...