Browsing Category
Server
113 posts
Detect Linux Kernel Rootkits Cheatsheet
Rootkits represent one of the most insidious forms of malware, allowing attackers to gain privileged access to a…
December 25, 2024
Hackers Exploit Visual Studio Code for Malicious Remote Access
A New Threat Emerges: Visual Studio Code as an Attack Vector In a recent cyber threat development, hackers…
December 10, 2024
ESET Flags UEFI Bootkit Targeting Linux Systems
In a concerning development, cybersecurity researchers at ESET have identified a sophisticated UEFI bootkit targeting Linux systems, marking…
December 2, 2024
Radare2 : UNIX-like Reverse Engineering Framework And Command-line Toolset
Description r2 is a complete rewrite of radare. It provides a set of libraries, tools and plugins to…
June 10, 2024
Toshiba Email Compromise Leaks Social Security Numbers – Analysis
Toshiba America Business Solutions’ (TABS) recent email compromise exposing Social Security numbers exposes a critical vulnerability in their…
May 30, 2024
Analysis of BloodAlchemy Malware: A New Evolution of Deed RAT
Background and Evolution BloodAlchemy is identified as an evolved form of Deed RAT, which in turn is a…
May 27, 2024
Ascension Healthcare Cyberattack: Disruptions and Emergency Service Diversions
A recent cyberattack on Ascension, a largest healthcare provider in the United States, has caused significant disruptions at…
May 11, 2024
Lateral Movement in Cybersecurity: Sneaking Sideways Through a Network
Imagine a thief breaking into your house. They bypass the front door (the initial intrusion) and start exploring…
March 31, 2024
Microsoft Unveiled Cyberattack By Russian Group Midnight Blizzard Targets Email
In a recent Microsoft security update, Microsoft unveiled, a cyberattack by a Russia-affiliated threat actor as Midnight Blizzard,…
March 9, 2024
Anonymous-Proxies: A Cutting-Edge Proxy Solution
Anonymous-Proxies boasts a wide range of proxy and VPN services, promising security, affordability, and unique features. But does…
February 7, 2024