Vidar Stealer is not new to our world. It is known for stealing sensitive information such as banking details, IP addresses, saved passwords, browser history, login credentials, and recently, known . . .
The Change: Government Agencies And Remote User Protection
In the early days of the Covid-19 pandemic, when organizations rapidly shifted their employees to remote work, the focus was typically on maintaining business continuity first and foremost. . . .
Read More >>Become A VIP Victim With New Discord Distributed Malware
Threat actors are always looking for a way to avoid detection, and one of the most popular techniques is to use legitimate services to mask malicious network activity. A recent trend is to abuse . . .
Read More >>Thwarting Jupyter Stealer
Jupyter Stealer is an evolving info stealer that is commonly spread using backdoored installations. We have recently encountered a new and improved version of this malware, which allows its operator . . .
Read More >>Supply Chain Attack – We Can’t Predict It, But We Can Stop It
Modern technology is making our life easier, but it also makes us more vulnerable in the face of the attacker. From multinational organizations, all the way down to individuals with a simple smart . . .
Read More >>Why Ransomware Protection Is A Vital Part of Healthcare
The healthcare industry is one of the most targeted verticals for ransomware attacks. According to IBM’s data breach report, “in healthcare, 50% of data breaches [in the US] were due to malicious . . .
Read More >>Taurus Loader: User-Guided Infection
In recent months we have seen a spike in events associated with Taurus loader. Although Taurus has already been covered extensively by researchers, we think its spreading method was left untouched by . . .
Read More >>Crackonosh - The Hidden Crypto Mining Malware
An article by Avast has introduced a novel malware by the name Crackonosh. This computer virus spreads through cracked software, specifically through illicit video game copies. The malware’s main . . .
Read More >>Please Note: The Kesaya Attack Was Preventable With Minerva Technology
On Friday, 02.07.21, computers running Kaseya VSA have been installing a malicious update that contains the REvil ransomware. This monumental breach has caught many MSP companies that use Kaseya off . . .
Read More >>Does the US 2021 Cybersecurity Executive Order do enough to protect government agencies?
Lessons from the Colonial Pipeline, and SolarWinds Attack
Cyberattacks and their real world consequences: SolarWinds was infamously hacked around March 2020, in an attack that made international . . .
Read More >>Sload Targeting Europe Again
Sload (also known as Starslord loader) is one of the most dangerous malware strain in recent years. It usually functions as a downloader, which is a computer virus that collects and exfiltrates . . .
Read More >>SystemBC Malware Hides Behind Socks5 Proxy
SystemBC malware has been used by hackers at least since 2019, when Proofpoint released a detailed analysis of the trojan and its methods of infection. The malware is sold on underground hacking . . .
Read More >>