Tips

Home/Tips
31 08, 2023

The emerging ransomware collective “Ransomed” has adopted a novel extortion strategy.

By | 2023-09-06T07:41:44+05:30 August 31st, 2023|Compromised, Evilproxy, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Tips|

Dubbed "Ransomed," this group was initially identified by cybersecurity analyst and blogger Flashpoint on August [...]

22 08, 2023

Chinese Hackers Using Stolen Ivacy VPN Certificate To Sign Malware

By | 2023-09-06T07:55:47+05:30 August 22nd, 2023|Compromised, Data Breach, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malware, Security Advisory, Security Update, Tips|

The Bronze Starlight hacking group has ingeniously employed a legitimate Ivacy VPN code-signing certificate to [...]

21 08, 2023

BlackCat’s Sphynx ransomware integrates Impacket, RemCom

By | 2023-08-28T04:34:30+05:30 August 21st, 2023|BOTNET, Compromised, Data Breach, Evilproxy, Exploitation, Internet Security, Mobile Security, Ransomware, Security Advisory, Security Update, Tips|

A new iteration of the BlackCat ransomware was recently unveiled by Microsoft's researchers. Termed 'Sphynx', [...]

17 08, 2023

Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks

By | 2023-09-06T07:56:06+05:30 August 17th, 2023|Backdoor, BOTNET, Compromised, cyberattack, Darknet, Data Breach, Evilproxy, Exploitation, hackers, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Software Issues, Tips|

Malicious actors could exploit existing vulnerabilities within the PowerShell Gallery to execute supply chain attacks [...]

14 08, 2023

Lapsus$: How They Hacked Some of the Biggest Targets

By | 2023-09-01T01:46:54+05:30 August 14th, 2023|BOTNET, Evilproxy, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Targeted Attacks, Tips|

The amateur hacker group Lapsus$—mostly teenagers with limited technical training—has skillfully breached major targets like [...]

Subscribe to our newsletter to receive security tips everday!