• 07 3184 7575
  • February 8, 2024
  • 0 Comments

Cybersecurity Threat Advisory: Threat actor targets government

This Cybersecurity Threat advisory discusses a Chinese threat actor known as “Earth Lusca” has been observed targeting government entities. They are using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing the group’s attacks against public and private sector entities across Asia, Australia, Europe, and North […]

  • February 5, 2024
  • 0 Comments

Cyberattack by QR Code based phishing

Recently there have been a surge of phishing emails cyberattack that ask victims to scan a QR code with their phone. The QR code then redirects users to phishing pages controlled by threat actors. What I have seen, the typical phishing is Microsoft branded, playing on how users were previously (legitimately) instructed by their IT […]

  • February 1, 2024
  • 0 Comments

Cybersecurity Threat Advisory: New malware campaign from Log4j security flaw

The hacker group, known as Lazarus, is linked to a global campaign. It involves an old security flaw found in Log4j to deploy previously unknown remote access trojans (RATs) on compromised hosts. To learn more and limit the impact of this malware, please review this Cybersecurity Threat Advisory. What is the threat? The new malware involves two […]

  • January 25, 2024
  • 0 Comments

Cybersecurity Threat Advisory: SQL injection vulnerability with 3CX

3CX advised customers that the SQL database integration has been disabled due to CVE-2023-49954. Businesses that use MongoDB or any of their web-based customer relationship management (CRM) integration templates are not affected. Read this Cybersecurity Threat Advisory to gain details of the vulnerability and recommendations to prevent exploitation. What is the threat? This vulnerability affects […]

  • January 22, 2024
  • 0 Comments

Cyber Security Awareness – How Do I Know My Regulatory Requirements

In reality, while rules and requirements about how to handle data don’t automatically make your data safe, they’re necessary. What’s needed can vary depending on the type of work you do, where you are, and how your organization is set up. If your company has personal information about employees or customers, it probably has to […]

  • January 17, 2024
  • 0 Comments

A phishing email pretends to be Paypal

We would like to share the recent phishing email we identified pretending to be an email from Paypal. The email is written in a way that make the reader think a fraudulent transaction has occurred in your Paypal account and it suggests the reader to contact the phone number to resolve this issue. Let’s have […]

  • January 11, 2024
  • 0 Comments

Cybersecurity Threat Advisory: Google OAuth vulnerability

In this Cybersecurity Threat Advisory, we’re looking at a critical Google OAuth vulnerability that allows ex-employees to maintain access to applications such as Slack and Zoom. After off boarding, attackers can achieve access by creating non-Gmail accounts using corporate email aliases. This poses severe risks, including unauthorized access and potential data breaches. CSB recommends disabling […]

  • December 18, 2023
  • 0 Comments

Is cyber insurance a good cyber security mitigation strategy?

There was 35% increase of Cyber incidents in 2020 alone with data breaches costing $4.24 million per year. Type of cyber incidents ranging from phishing, ransomware, remote workforces, stolen credentials and personal identity impersonations. Therefore, organizations must secure themselves against unknown and advancing threats while striking a balance between proactive and reactive measures. We acknowledge […]

  • December 4, 2023
  • 0 Comments

Cybersecurity Threat Advisory: Critical security patches for GitLab

This Cybersecurity Threat Advisory highlights GitLab’s recent critical vulnerability, which security update have been released for. A successful exploitation can allow threat actors to mask themselves as other users during scheduled security scans while they run automated tasks (also known as pipelines). CSB recommends applying the latest GitLab patches as soon as possible. What is […]

  • November 20, 2023
  • 0 Comments

What is malware?

What is malware? Malware is a various type of malicious software, developed by the cybercriminals (called hackers) to allow them steal sensitive data, damage or destroy computers and computer systems. The common malware that the hackers usually hack into computers are viruses, worms, Trojan viruses, rootkits, spyware, and ransomware. The malware can install to your […]