How to build a proactive incident response plan

Organizations have long since relied on a reactive approach to cybersecurity. However, with the ever-increasing sophistication of tools for malicious actors, a reactive approach may lead to disaster. A single…

A New Microsoft Windows Installer Zero-day Is Exploited

Abdelhamid Naceri, a security researcher, made the zero-day in question public. He identified the flaw through an examination of the CVE-2021-41379 fix. It appears that the problem was not properly…

Malicious Actors Were Able to Compromise Exposed Services in 24 Hours

Harmful actors are continually scouring the Internet for vulnerable services that may be used to gain access to internal networks or carry out other malicious acts. Researchers sometimes develop publicly…

Rooting Malware Is Back for Mobile. Here’s What to Look Out For.

Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store. Over the last several years, as…

MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption

A politically motivated group is paralyzing Israeli entities with no financial goal — and no intention of handing over decryption keys. The MosesStaff hacking group is aiming politically motivated, destructive…

Robinhood Customers Have Their Email Addresses Available for Sale on Hacker Forum

A famous hacking forum and marketplace is selling the personal information of about 7 million Robinhood users who were exposed in a recent data breach. Last week, Robinhood announced a…

Red Team: C2 frameworks for pentesting

Infosec Institute –  Infosec Institute –  C2 frameworks — the abbreviation to the Command and Control (C&C) infrastructure — are how red teamers and pentesters can control compromised machines during…

What Is Privileged Access Management (PAM)?

To understand what privileged access management is, we need to first understand what privileged access refers to. This article will cover many aspects of PAM, including definition, importance, functionality, statistics,…

Avast Q3’21 Threat Report

Avast –  Avast –  Latest Avast Q3’21 Threat Report reveals elevated risk for ransomware and RAT attacks, rootkits and exploit kits return. Foreword The threat landscape is a fascinating environment…

New banking Trojan SharkBot makes waves across Europe, US

A new Android banking Trojan has been discovered that is able to circumvent multi-factor authentication controls through the abuse of ATS.  At the end of October, cybersecurity researchers from Cleafy…