Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief BenefitsRecently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... BLOG Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT... OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in... Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is... The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...
Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief BenefitsRecently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian...
BLOG Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions... Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT... OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in... Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is... The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...
Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack...
A Bootloader Vulnerability Leaves Most Platforms Vulnerable August 17, 2020 Researchers at Eclypsium discovered a vulnerability in an open source bootloader called GRUB, widely used by most Linux distributions...
Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing...
What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT...
OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their...
Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in...
Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is...
The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash...
Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...