Search Results for: virus Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative... Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... Knowledge Center Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan... Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation... Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash... Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed... Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware... Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post Massive Cyberattack on Ukrainian Government Sites January 25, 2022 The Russia-Ukraine conflict is escalating day-by-day, and a massive cyberattack on Ukrainian government sites on the night of January 13th... Blog Post Husband and Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies February 8, 2022 In recent times, Eastern Europe has emerged as somewhat of a safe haven and Wild West for various cybercriminal gangs,... Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it... Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal... Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,...
Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative...
Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
Knowledge Center Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan...
Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...
Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash...
Blog Post TangleBot Poses Harm To Android Users in US and Canada October 22, 2021 As hackers continue to take advantage of the recent pandemic, cybersecurity experts have found a new SMS smishing virus. Dubbed...
Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of...
Blog Post Types of Malware March 6, 2020 Malware is a potential term to define a malicious code written to perform mysterious actions on the target system. Malware...
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post Massive Cyberattack on Ukrainian Government Sites January 25, 2022 The Russia-Ukraine conflict is escalating day-by-day, and a massive cyberattack on Ukrainian government sites on the night of January 13th...
Blog Post Husband and Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies February 8, 2022 In recent times, Eastern Europe has emerged as somewhat of a safe haven and Wild West for various cybercriminal gangs,...
Blog Post Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it...
Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal...
Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,...