The number of cyberattacks is increasing alarmingly around the globe. Nowadays, cybercriminals target almost all companies despite their size or domain. This encourages companies to find a solution to secure their systems and confidential data. Thus, companies invest large capital and resources in penetration testing as their first line of defense. Penetration testing is an effective cybersecurity […]
Is CIFS still relevant ?
Protocols have guided server-client communications for a long time—and they’re a good way to send and receive data. But every protocol has various nuances. Therefore, you should know which protocol you want to use before setting up a network. Even with the advancement of technology, server-client protocols have remained constant. As such, many are 20 years […]
Network Segmentation Best Practices
Your network is your company’s greatest strength. However, it can also be your company’s greatest weakness if you don’t protect it well. Networks have changed a lot since the days of simple switches, routers, and a flat network structure. Today, we have on-prem servers, devices with cloud services, and a distributed workforce. With more complex networks, network […]
Windows Tech Tips
15 different Get-ADuser examples that may be useful in your day to day admin tasks (Commandline Ninja) Mapping Azure File Shares on Windows Devices (Petervandervoude)
Google PlayStore Apps Leads to Phishing Sites
A family of malicious apps from developer “Mobile apps Group sic” are listed on Google Play and infected with Android/Trojan.HiddenAds.BTGTHB. In total, four apps are listed, and together they have amassed at least one million downloads. When users first install this malicious app, it takes a couple of days before it begins to display malicious behavior. […]
RomCom Threat Actor Spoofs Keepass and Solarwinds
The threat actor known as RomCom is actively deploying new campaigns aimed at victims in Ukraine and English-speaking regions. The BlackBerry Threat Research and Intelligence Team discovered new campaigns that spoof popular brand-name software packages. The United Kingdom is possibly a new target, while Ukraine is still the main focus. Blackberry found RomCom leveraging the […]
FormBook Stealer Is Gaining Traction
FormBook stealer is an infostealer trojan available as a malware-as-service. This malware is often used by attackers with low technical literacy and little programming knowledge. FormBook can be used to steal various information from infected machines. Despite how easy it is to set up and use, the malware has advanced stealing and evasion functions including […]
How IOC Helps in Cybersecurity
An indicator of compromise (IOC) refers to something left by a cyberattacker on your system. Whether this was intentional or a mistake might not be clear initially. A cyberattacker might leave an indicator of compromise directly through system activity or indirectly through system modification. Cyberattackers often take months to implement, escalate, and position their attacks correctly. In turn, […]
Is Open VPN Good Enough
Cyberattackers use various techniques to harm you, ranging from cyberstalking to ransomware. Packet sniffing is one of the first techniques cyberattackers learn in their “careers”. In short, packet sniffing is problematic because of its simplicity and the prevalence of packet sniffing tools. For instance, you can access these tools as part of Kali Linux or download them […]
What is Lateral Movement
Appearing in 25% of all attacks encountered by respondents of the 2022 VMware Global Incident Response Threat Report, we can no longer ignore the issue of lateral movement. Unless you understand exactly what it is and what it’s all about, this malicious tactic can undermine your network’s security. In this article, you’ll learn what lateral movement is, […]
Windows News
More hot news on the Windows front regarding the recent release of Windows 11 22H2: Windows 11 Phishing Protection Feature Poses Potential Risk (ITPro Today) Microsoft fixes Windows TLS handshake failures in out-of-band updates(Bleeping Computer) And here’s a surprising change concerning Windows 11 that caught some of us off guard: Windows Terminal is now the Default […]
BlackCat Ransomware
First observed in mid-November 2021 by researchers from the MalwareHunterTeam, BlackCat (aka AlphaVM, AlphaV, or ALPHV) swiftly gained notoriety for being the first major professional ransomware family to be written in Rust, a cross-platform language that enables malicious actors to customize malware with ease for different operating systems like Windows and Linux, thus affording a […]