Search Results for: malicious code Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and... Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Blog Post InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) Bugs September 9, 2021 Cybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,... Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation... Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated... Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their... Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of... Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and... Blog Post Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,... Blog Post A Google Chrome Extension Steals Crypto-wallet Keys January 8, 2020 Recently, a code was found injected in a Google Chrome extension named “Shitcoin Wallet” for stealing the passwords and private...
Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and...
Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?...
Blog Post InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) Bugs September 9, 2021 Cybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,...
Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in...
Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have...
Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...
Blog Post New Cloud Snooper Attack Could Bypasses Firewall Security Measures February 28, 2020 By investigating malware infections of cloud infrastructure servers hosted in the Amazon Web Services (AWS) cloud, researchers found a sophisticated...
Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private...
Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their...
Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of...
Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and...
Blog Post Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,...
Blog Post A Google Chrome Extension Steals Crypto-wallet Keys January 8, 2020 Recently, a code was found injected in a Google Chrome extension named “Shitcoin Wallet” for stealing the passwords and private...