Month: July 2022

Lightning Framework: New “Swiss Army Knife” Linux malware

Lightning Framework is a new undetected ‘Swiss Army Knife’-like Linux malware that has modular plugins and the ability to install rootkits. The framework has both passive and active capabilities for communication with the threat actor, including opening up SSH on an infected machine, and a polymorphic malleable command and control configuration. The framework consists of […]

Data Leak: What and How to Prevent

A data leak is an unauthorized data transfer from within a company to a third party. Individuals, companies, and government agencies experience financial and reputational loss if unauthorized parties get access to their sensitive data. All businesses benefit from monitoring cybersecurity risks and taking appropriate steps to prevent data loss and theft. In this article, […]

Your Complete Guide to Digital Workplace Solutions

A digital workplace is a virtual platform designed to streamline everyday work and improve employees’ efficiency, collaboration, and morale. It’s a central hub that extends the physical office workspace and allows employees to work without being bound to a single location. Employees use digital workplace technologies to streamline business operations, communicate securely, and share ideas […]

VMs vs Containers : Which should you Pick

If you’re looking to improve computer performance, the list narrows down to two notable inventions: virtualization and containerization. Both methods have allowed IT professionals to benefit from the physical hardware running on a server. The goal is to use the same resources but run different operating systems. The question I’ll be answering in this article is: which […]

RansomWare : BlackByte

BlackByte is a ransomware family that has been building a name for itself since 2021. Like its contemporaries, it has gone after critical infrastructure for a higher chance of a getting a payout. Blackbyte Initial versions used symmetric keys, it has multiple variants, archives files using WinRAR, uses trojanized legitimate tools, and involves phishing emails […]

Tips and Tutorials

A good way to get your head around any technology area is to begin by reading a well-crafted article on the subject that starts with “What is…?” Here are a few of our favorite what-is guides from our TechGenix website: What Is Network Orchestration? What Is Virtualization-Based Security (VBS)? What Is Network Segmentation? What Is a Digital […]

Linux News

It used to be that Microsoft attracted all the attention of malicious hackers. They seemed mostly happy to leave macOS and Linux alone for the most part. Not any more (Ars Technica). Will Microsoft’s growing footprint in the Linux/FOSS landscape cause the Black Hat community to up their targeting of Linux systems? What do you think? Open Source software […]

Smash-and-Grab: AstraLocker 2.0 Pushes Ransomware Direct from Office Docs

ReversingLabs recently discovered instances of the AstraLocker 2.0 malware distributed directly from Microsoft Word files used in phishing attacks.  The “smash and grab” attack methodology as well as other features suggest the attacker behind this malware is low-skill and looking to cause disruption, compared with the more patient, methodical, and measured approach to compromises used […]

Spyware Vendor Targets Mobile Users

Google has been tracking the activities of commercial spyware vendors for years. Recently, RCS Labs, an Italian vendor, has been found to use a combination of tactics, including atypical drive-by downloads as initial infection vectors to target mobile users on both iOS and Android. Google has identified victims located in Italy and Kazakhstan. All campaigns […]

Rise of LNK (Shortcut files) Malware | McAfee Blog

A LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. These files can be created manually using the standard right-click create shortcut option or sometimes they […]

Windows Tips and Tricks

How to Deploy Windows 10 (11) with PXE Network Boot? (Windows OS Hub) How to Create a Wi-Fi Hotspot on your Windows PC? (Windows OS Hub) How to Repair EFI/GPT Bootloader on Windows 10 or 11? (Windows OS Hub) How to replace your Windows 11 Start menu with a third-party app (ZDNet) How to install Microsoft Store apps and […]

Scroll to top