Ryuk Ransomware New Varient

Ryuk Ransomware New Varient

ANSSI have spotted a new Ryuk ransomware variant that implements worm-like capabilities that allow within local networks. This version holds a new attribute allowing it to self replicate over the…
H2C Smuggling Attack

H2C Smuggling Attack

A novel alternative to traditional HTTP request smuggling that spotlighted an obsolete, hitherto obscure protocol has been recognized as 2020’s top web hacking technique.HTTP/2 cleartext (H2C) smuggling abuses H2C-unware front-ends to create…
Malicious Amazon Alexa Vetting

Malicious Amazon Alexa Vetting

Amazon's skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to publish a deceptive skill under any arbitrary developer name and even make backend…
Threat Needle Malware

Threat Needle Malware

A prolific North Korean state-sponsored hacking group aka Lazarus has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry leveraging…
TDoS 📞 .. Threat Phenomenon

TDoS 📞 .. Threat Phenomenon

DDoS attacks are becoming more challenging than ever before. The attackers are now beefing up DDoS attacks with threat vectors that include but are not limited to the abuse of Windows RDP…
ICS in Radar of new Threat Actors

ICS in Radar of new Threat Actors

Four new hacking groups targeting industrial systems have been detected over the past year and there's an increased amount of investment from cyber attackers targeting industry and industrial control systems…