Tag

cyber incident response
outlook logo
As the world of cybersecurity constantly evolves, so do the strategies employed by cybercriminals. A recent adaptation, coined as the “ZeroFont Phishing Technique“, has been making waves in the cybersecurity landscape.  Hackers are utilizing a new trick of using zero-point fonts in emails to make malicious emails appear as safely scanned by security tools in...
Read More
clorox cyber attack
In August 2024, the internationally acclaimed manufacturer of cleaning products, Clorox, experienced a significant cyber-attack. The aftermath of this breach resulted in a slew of operational disruptions, extending beyond the initial incident and deeply affecting the company’s first quarter results in 2024. The Unveiling of the Cyber Attack According to a recent SEC filing, Clorox...
Read More
Xenomorph Banking Trojan
As technology continues to evolve, so do the methods of cybercriminals. The latest threat to emerge is a new version of the Xenomorph banking Trojan, which has set its sights on over 35 well-established financial institutions across the U.S. and various digital cryptocurrency wallets. Understanding the Xenomorph Banking Trojan Xenomorph, an offshoot of the infamous...
Read More
cybersecurity
JPCERT, Japan’s computer emergency response team, has recently uncovered a new sophisticated ‘MalDoc in PDF’ cyberattack. This attack, detected in July 2023, cleverly evades detection by concealing malicious Word files within PDF documents.  The file analyzed by JPCERT makes use of polyglots to confuse analysis tools and evade detection. While most scanning engines and tools...
Read More
Wifi Connection Sign
In the ever-evolving landscape of cyber threats, cybersecurity experts are raising concerns about a newly discovered malware strain known as “Whiffy Recon.” This sophisticated malware, uncovered by researchers from Secureworks Counter Threat Unit (CTU), leverages Wi-Fi scanning and Google’s geolocation API to triangulate the location of infected devices. With the capability to continuously track compromised...
Read More
PowerShell Gallery
The PowerShell Gallery, a central repository maintained by Microsoft for sharing and acquiring PowerShell code, has recently faced heightened scrutiny due to a series of active vulnerabilities that pose a significant risk of supply chain attacks against its users. These flaws, uncovered by security researchers from Aqua, have shed light on potential weaknesses in the...
Read More
Ransomware breach, Ransomware response, Data Breach, Cyber Incident Response
The utilization of ransomware is continuously advancing as cybercriminals discover novel methods to exploit vulnerabilities and optimize their financial gains. An exemplification of this is the Clop ransomware gang, which has recently adapted its tactics by resorting to torrents to disclose stolen data from its victims. By employing this approach, Clop aims to surmount the...
Read More