• 07 3184 7575
  • March 11, 2024
  • 0 Comments

How to identify business critical systems?

If you are a returning viewer, welcome back to the 2nd posts of this month and thank you for your support. For this week, let’s have a look on business critical systems. There are three critical systems: 1. Mission critical systems These are the systems that are responsible for executing the functions organizations depend on […]

  • March 7, 2024
  • 0 Comments

Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered

Today’s Cybersecurity Threat advisory discusses the update to the popular Bumblebee malware loader that increases its defense evasion capabilities. The loader is commonly distributed via “.lnk” (softlink/shortcut) files attached to an email or compressed in a .zip archive attached to an email. Once installed, the loader allows attackers to deploy their desired payload onto affected […]

  • March 4, 2024
  • 0 Comments

Identifying your business assets (Confidentiality, Integrity, Availability)

Welcome back if you have been following our posts for cyber awareness month last month. If you are new to this post series, welcome and thank you for your support. As you probably realized, IT becomes integral to day-to-day operation of a business, the cost of failing to protect these systems becomes greater. All organizations […]

  • February 22, 2024
  • 0 Comments

Cybersecurity Threat Advisory: Significant increase of cyber incidents

This Cybersecurity Threat Advisory sheds light on the recent global events between Israel and Hamas that have caused a surge in cyber incidents from hacker activists, also known as “hacktivists”. These attacks have been experienced on both sides of the conflict, as well as in other nations. Common targets of these attacks have been government […]

  • February 19, 2024
  • 0 Comments

Avoid bankruptcy by Cyber ATTACK

We recently learned that cyber threat actors, with the intention of financial gain, have started to convert their business model to a subscription service. This service offers subscribers protection to be excluded from being ransom in the future. Welcome to the new digital era of extortion by actors who operate like mafia, extorting money to […]

  • February 15, 2024
  • 0 Comments

Cybersecurity Threat Advisory: BlackCat ransomware targets Microsoft Azure

This Cybersecurity Threat Advisory reviews the latest movements of the BlackCat ransomware gang. They are using the Sphynx encryptor to target Microsoft Azure storage through a recently discovered vulnerability in Azure’s security infrastructure. The BlackCat (ALPHV) ransomware gang is using stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt targets’ Azure cloud storage. […]

  • February 12, 2024
  • 0 Comments

Let’s talk about the top three ransomware in 2023.

First in the chart is Akira ransomware. It steals sensitive data and encrypts it, rendering it inaccessible to the victim. Threat actors then demand a ransom for decryption and threaten to leak the stolen data on the dark web if their demands are not met. It was first seen in early 2023. Second in the […]

  • February 8, 2024
  • 0 Comments

Cybersecurity Threat Advisory: Threat actor targets government

This Cybersecurity Threat advisory discusses a Chinese threat actor known as “Earth Lusca” has been observed targeting government entities. They are using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing the group’s attacks against public and private sector entities across Asia, Australia, Europe, and North […]

  • February 5, 2024
  • 0 Comments

Cyberattack by QR Code based phishing

Recently there have been a surge of phishing emails cyberattack that ask victims to scan a QR code with their phone. The QR code then redirects users to phishing pages controlled by threat actors. What I have seen, the typical phishing is Microsoft branded, playing on how users were previously (legitimately) instructed by their IT […]

  • February 1, 2024
  • 0 Comments

Cybersecurity Threat Advisory: New malware campaign from Log4j security flaw

The hacker group, known as Lazarus, is linked to a global campaign. It involves an old security flaw found in Log4j to deploy previously unknown remote access trojans (RATs) on compromised hosts. To learn more and limit the impact of this malware, please review this Cybersecurity Threat Advisory. What is the threat? The new malware involves two […]