An Iranian-backed hacking group called Fox Kitten has been linked with a ransomware named Pay2Key that has been targeting organizations in Israel and Brazil. According to experts, this particular ransomware is part of an ongoing digital showdown... Read more
A popular open-source cryptography library, Bouncy Castle has reported severe authentication bypass vulnerability. On exploitation the vulnerability (CVE-2020-28052) allows the attacker to gain access to user or administrator accounts due t... Read more
Amidst the ongoing pandemic, enterprises are facing the wrath of brute force attacks since weak passwords are diagnosed as its cause. Cybercriminals have taken to such attacks using either a variety of botnets or Remote Desktop Protocol., with a... Read more
A new delivery method has been added to the delivery tactics of Zebrocy malware by its authors. The latest versions of Zebrocy malware have been analyzed by researchers and discovered that the malware operators, APT28, have chosen the Golang lan... Read more
With the use of a new attack technique revealed with a proof-of-concept exploit code, Kerberos, a computer-network authentication protocol, can be bypassed. This technique that is termed the Bronze Bit attack, exploits the CVE-2020-17049 vulnera... Read more
Cryptocurrency mining was recently been used as a way to hide the purpose of their activity and to avoid triggering high-priority alerts by an advanced threat group called Bismuth. Typically regarded as a non-critical security issue, the method... Read more