Browsing Category
Security
413 posts
Building A SOC: Key Considerations And Strategies
Organizations face a relentless onslaught of cyber threats in today’s digital age. A strong Security Operations Center (SOC)…
July 31, 2024
How I Hacked Zoom? The Session Takeover Exploit Chain Analysis
This article explores a recently discovered exploit chain that allows attackers to take over Zoom sessions. The exploit…
June 20, 2024
Job Seekers Aware: Phishing Attacks On The Rise
Scammers are sending fake job emails with malware to steal information from job seekers. According to recent phishing…
June 12, 2024
Elon Musk Sounds Alarm on Apple’s Deep Integration with OpenAI, Citing Security Concerns
Tech mogul Elon Musk has ignited a firestorm over data security concerns with his recent pronouncements regarding Apple’s…
June 11, 2024
Is Your Phone Vulnerable? NSA Recommends a Simple Fix: Restart
Imagine this: you’re scrolling through social media, laughing at cat videos, when BAM! Your phone’s been hacked by…
June 4, 2024
go-secdump Tool Remotely Dump Secrets From Windows registry
Package go-secdump is a tool built to remotely extract hashes from the SAM registry hive as well as…
June 3, 2024
Toshiba Email Compromise Leaks Social Security Numbers – Analysis
Toshiba America Business Solutions’ (TABS) recent email compromise exposing Social Security numbers exposes a critical vulnerability in their…
May 30, 2024
Analysis of BloodAlchemy Malware: A New Evolution of Deed RAT
Background and Evolution BloodAlchemy is identified as an evolved form of Deed RAT, which in turn is a…
May 27, 2024
Ebury: A Long-Lived Linux Botnet Still Lurking in the Shadows
A recent white paper by ESET, a cybersecurity company, sheds light on a persistent threat: the Ebury botnet.…
May 27, 2024