KIMSUKY APT37 Tactic Change

KIMSUKY APT37 Tactic Change

North Korean APT group Kimsuky is adopting new TTP, by splitting it into two smaller subgroups: CloudDragon and KimDragon. It often employs social engineering, spear-phishing, and watering hole attacks to…
Qualcomm Chips Vulnerability

Qualcomm Chips Vulnerability

A vulnerability found in chips manufactured by Qualcomm that are used in 40% of the world’s smartphones can allow an attacker to inject malicious code.The vulnerability is found in Qualcomm’s…
Spring Cleaning

Spring Cleaning

An event referred to as spring cleaning, where we take some time from our regular routines to focus on bringing order back to our homes. We remove the junk that…
Bazar Backdoor bypasses

Bazar Backdoor bypasses

Threat actors using BazarBackdoor used an unusual combination of lures, tactics, and networks to target corporate customers. Threat perpetrators use the victims' own initiative to get through security barriers and…
Ryuk Invaded via Pirate

Ryuk Invaded via Pirate

Ryuk ransomware, has been targeting hospital and healthcare providers over the last year, The path of infection for most ransomware is using phishing, followed by targeting servers with vulnerabilities. But…
Google Password Protect

Google Password Protect

Google is taking steps to make people’s accounts more secure by announcing two initiatives to mark World Password Day. Automatically enrolling all Google account users in two-factor authentication. This will…
N3TWorm Spread

N3TWorm Spread

A new ransomware group 'N3TW0RM' is targeting Israeli companies. N3TW0RM, like other ransomware gangs, has set up a data leak platform where they threaten to release stolen files to threaten…
UNC2529

UNC2529

A new financially motivated threat actor, tracked by FireEye Experts as UNC2529. The group targeted the organization with phishing attacks aimed at spreading at least three new sophisticated malware strains.…