Intune vs. WSUS vs. SCCM – Costs, Benefits, Ease of Use, and Deployment

Patching has certainly gained a lot of momentum ever since research has proven that ‘unattended’ apps and software can quickly lead to a data leak.  Patching is the new ‘kid’…

Crypto-mining Malware Targets Huawei Cloud

Cloud service providers, like, for instance, Huawei Cloud, are now targeted by some new variant of a past crypto-mining malware. This is Linux-based and its initial version started its activities…

Streamline Customer Screening Today. Here’s How.

When it comes to preventing financial crime such as anti-money laundering, organizations need to make use of a customer screening process that takes human errors into account – Let’s dig…

GhostEmperor Campaign Targets Asian Countries Abusing Microsoft Vulnerabilities

Cybersecurity researchers have recently disclosed details of the Chinese-based threat actor GhostEmperor who allegedly targeted several south-east Asian countries for more than a year. According to Kaspersky specialists Mark Lechtik,…

Ryuk Ransomware: Origins, Operation Mode, Mitigation

What is Ryuk Ransomware? Widely known for targeting governments, academia, healthcare, manufacturing, and technology organizations’ cybersystems, Ryuk is a ransomware-as-a-service (RaaS) group that’s been active since August 2018. It typically encrypts data…

Google, Microsoft and Oracle generated most vulnerabilities in 2021

By Waqas When it comes to vulnerabilities; Google holds the top slot, Microsoft is on number two while Oracle is on number three H1 2021. This is a post from…

Cryptominer z0Miner Uses Newly Discovered Vulnerability CVE-2021-26084 to Its Advantage

Trend Micro – Trend Micro – Cryptominer z0Miner Uses Newly Discovered Vulnerability CVE-2021-26084 to Its Advantage Exploits & Vulnerabilities Recently, we discovered that the cryptomining trojan z0Miner has been taking…

Database Penetration Testing

In this post, I would like to share knowledge and experience while doing Database Penetration Testing. The purpose of Penetration Testing is to find vulnerabilities within the system and simulate…

AWS Penetration Testing Review

What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered as one of the areas that pentester will invest in during Red Team Activities. The…