Tor Relays on Dark Web activities

Tor Relays on Dark Web activities

An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February 2021, a study revealed .The entity attacking Tor users is…
Lemon Ducks Exchange Servers

Lemon Ducks Exchange Servers

ProxyLogon exploit, impact on-prem Microsoft Exchange Server 2013, 2016, and 2010. Patches, vulnerability detection tools, and mitigation instructions were made available in March, but it is still estimated that up…
Revil’ ng The Devil 😈

Revil’ ng The Devil 😈

REvil (aka Sodinokibi) is a ransomware family that has been targeting numerous organizations and wreaking havoc. It was first identified in early-2019 and used by the GOLD SOUTHFIELD threat group.…
Remote Browser Isolation

Remote Browser Isolation

Remote browser isolation is a technology also referred to as web isolation or simply browser isolation. Remote browser isolation is an advanced cybersecurity technique that provides an additional layer of…
Panda 🐼 Stealer

Panda 🐼 Stealer

A new information stealer has been discovered that is being delivered via spam emails and targets cryptocurrency wallets. This threat is named Panda Stealer and was observed mostly targeting users…
Colonial Attack Emerges

Colonial Attack Emerges

A cyber-attack has never taken down a U.S. fuel pipeline quite as big as the Colonial Pipeline. It’s the nation’s largest gasoline, diesel and jet fuel system and a critical source…
Exchange Antiphising Feature

Exchange Antiphising Feature

Recently Google implemented new security features to Gmail to address phishing threats, and now Microsoft is following suit with a planned update to Exchange. Via Microsoft's 365 Roadmap, the company…
Microsoft Warns on BEC

Microsoft Warns on BEC

Microsoft is warning of a large-scale BEC campaign that targeted more than 120 organizations with gift card scam. The attackers targeted organizations in multiple industries, including the consumer goods, process…