Avoid bankruptcy by Cyber ATTACK
We recently learned that cyber threat actors, with the intention of financial gain, have started to convert their business model to a subscription service. This service offers subscribers protection to be excluded from being ransom in the future. Welcome to the new digital era of extortion by actors who operate like mafia, extorting money to […]
Cybersecurity Threat Advisory: BlackCat ransomware targets Microsoft Azure
This Cybersecurity Threat Advisory reviews the latest movements of the BlackCat ransomware gang. They are using the Sphynx encryptor to target Microsoft Azure storage through a recently discovered vulnerability in Azure’s security infrastructure. The BlackCat (ALPHV) ransomware gang is using stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt targets’ Azure cloud storage. […]
Let’s talk about the top three ransomware in 2023.
First in the chart is Akira ransomware. It steals sensitive data and encrypts it, rendering it inaccessible to the victim. Threat actors then demand a ransom for decryption and threaten to leak the stolen data on the dark web if their demands are not met. It was first seen in early 2023. Second in the […]
Cybersecurity Threat Advisory: Threat actor targets government
This Cybersecurity Threat advisory discusses a Chinese threat actor known as “Earth Lusca” has been observed targeting government entities. They are using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing the group’s attacks against public and private sector entities across Asia, Australia, Europe, and North […]
Cyberattack by QR Code based phishing
Recently there have been a surge of phishing emails cyberattack that ask victims to scan a QR code with their phone. The QR code then redirects users to phishing pages controlled by threat actors. What I have seen, the typical phishing is Microsoft branded, playing on how users were previously (legitimately) instructed by their IT […]
Cybersecurity Threat Advisory: New malware campaign from Log4j security flaw
The hacker group, known as Lazarus, is linked to a global campaign. It involves an old security flaw found in Log4j to deploy previously unknown remote access trojans (RATs) on compromised hosts. To learn more and limit the impact of this malware, please review this Cybersecurity Threat Advisory. What is the threat? The new malware involves two […]
Cybersecurity Threat Advisory: SQL injection vulnerability with 3CX
3CX advised customers that the SQL database integration has been disabled due to CVE-2023-49954. Businesses that use MongoDB or any of their web-based customer relationship management (CRM) integration templates are not affected. Read this Cybersecurity Threat Advisory to gain details of the vulnerability and recommendations to prevent exploitation. What is the threat? This vulnerability affects […]
Cyber Security Awareness – How Do I Know My Regulatory Requirements
In reality, while rules and requirements about how to handle data don’t automatically make your data safe, they’re necessary. What’s needed can vary depending on the type of work you do, where you are, and how your organization is set up. If your company has personal information about employees or customers, it probably has to […]
Cybersecurity Threat Advisory: End-of-Life firewalls actively exploited
Sophos recently addressed a critical vulnerability CVE-2022-3236 involving end-of-life (EOL) firewalls that had been actively exploited. The vulnerability prompted Sophos to release patches for unsupported firewalls after reports of successful attacks on these systems surfaced. Read this Cybersecurity Threat Advisory to learn how to protect the affected firewalls. What is the threat? The threat involves a remote […]
A phishing email pretends to be Paypal
We would like to share the recent phishing email we identified pretending to be an email from Paypal. The email is written in a way that make the reader think a fraudulent transaction has occurred in your Paypal account and it suggests the reader to contact the phone number to resolve this issue. Let’s have […]