For the first time ever, this year the Black Hat 2020 conference went virtual. However, there were plenty of takeaways from the event, and cybersecurity information in abundance. Key Takeaways Exploit Development Only if there is a broader pictu... Read more
A combination of HTML smuggling techniques and data blobs are being used by a new attack campaign to evade detection and to download malware. The campaign that is dubbed as Duri, exploits the JavaScript blob method which generates the... Read more
Among several attackers as a means of reaching out to their ultimate objectives via attacking intermediary targets, supply chain attacks are gradually picking up momentum. Very recently a Chinese company was found at the receiving end of such a... Read more
Immense notoriety has been gained by a specific group of North Korean threat actors due to the constant barrage of cyberattacks on organizations and businesses across the globe. In the wake of these attacks, the U.S. Department of Homeland Secur... Read more
Large scale attacks have mushroomed in 2020 according to a new study by a cloud computing firm. According to this study, large scale attacks have seen an increase of 273% in the first quarter as compared to the previous year. As per another repo... Read more