Gummy Browsers: The New Cyberattack Developed by Researchers

Academic experts from a U.S. university designed a new type of cyberattack dubbed Gummy Browsers. Its main characteristics include the capturing of fingerprints and also tricking the browser. Gummy Browsers…

How using the purple team approach helps in addressing cybercrime

Automated purple teaming is one of the best ways to address cybercrime as it does not only test for the deficiencies in existing security controls – Let’s dig deeper into…

Tracking CVE-2021-26084 and Other Server-Based Vulnerability Exploits via Trend Micro Cloud One and Trend Micro Vision One

Trend Micro – Trend Micro – A more detailed explanation of this chain and the specific techniques observed in this campaign can be found in our tech brief. We used…

Intune vs. WSUS vs. SCCM – Costs, Benefits, Ease of Use, and Deployment

Patching has certainly gained a lot of momentum ever since research has proven that ‘unattended’ apps and software can quickly lead to a data leak.  Patching is the new ‘kid’…

Crypto-mining Malware Targets Huawei Cloud

Cloud service providers, like, for instance, Huawei Cloud, are now targeted by some new variant of a past crypto-mining malware. This is Linux-based and its initial version started its activities…

Streamline Customer Screening Today. Here’s How.

When it comes to preventing financial crime such as anti-money laundering, organizations need to make use of a customer screening process that takes human errors into account – Let’s dig…

GhostEmperor Campaign Targets Asian Countries Abusing Microsoft Vulnerabilities

Cybersecurity researchers have recently disclosed details of the Chinese-based threat actor GhostEmperor who allegedly targeted several south-east Asian countries for more than a year. According to Kaspersky specialists Mark Lechtik,…

Ryuk Ransomware: Origins, Operation Mode, Mitigation

What is Ryuk Ransomware? Widely known for targeting governments, academia, healthcare, manufacturing, and technology organizations’ cybersystems, Ryuk is a ransomware-as-a-service (RaaS) group that’s been active since August 2018. It typically encrypts data…

Google, Microsoft and Oracle generated most vulnerabilities in 2021

By Waqas When it comes to vulnerabilities; Google holds the top slot, Microsoft is on number two while Oracle is on number three H1 2021. This is a post from…

Cryptominer z0Miner Uses Newly Discovered Vulnerability CVE-2021-26084 to Its Advantage

Trend Micro – Trend Micro – Cryptominer z0Miner Uses Newly Discovered Vulnerability CVE-2021-26084 to Its Advantage Exploits & Vulnerabilities Recently, we discovered that the cryptomining trojan z0Miner has been taking…