In continuation to our last post where we introduced our readers to Dropper-as-a-service, in this post, we elaborate on how it works through an active campaign. An ongoing malevolent digital campaign has been exploiting a network of websites to... Read more
The digital world has to prepare itself for Dropper-as-a-Service (DaaS), now that we have malware-as-a-service and ransomware-as-a-service. Cybercriminals are a ruthless breed, and they’re using DaaS to spread their virus over thousands of... Read more
Apple has issued a security advisory addressing two zero-day flaws that are now being exploited in active attacks. These vulnerabilities are identified as CVE-2021-30860 and CVE-2021-30858 in iOS/macOS. Both of these vulnerabilities are zero-day... Read more
The REvil ransomware group is back in full force, digitally assaulting new victims and leaking stolen data to a data leak site. The REvil ransomware operation, dubbed Sodinokibi, has been attacking organizations around the world since 2019, dema... Read more
In order to obtain illegitimate revenue, cybercriminals are increasingly targeting internet connections. According to researchers, in the cybercrime arena, an approach involving the usage of proxyware is gaining acceptance. Internet bandwidth is... Read more