Qualitative vs Quantitative: Methods of Cyber Risk Analysis
Is one more effective than the other? In part one of a new CRQ series, we take a closer look at the outcomes of each approach.
Evolving Malware Attacks: Bing Chat Compromised
Malicious advertisements being injected into Bing Chat responses, promoting fake download sites that distribute malware.
Malicious Misconfiguration: AMBERSQUID Cryptojacking
AMBERSQUID, has been targeting uncommon Amazon Web Services (AWS) offerings to illicitly mine cryptocurrency.
Exploitation of Vulnerabilities: Malicious Window’s ThemeBleed
CVE-2023-38146 or ThemeBleed is a high-severity security flaw affecting Windows systems.
The Perils of Phishing Attacks: Advanced W3LL Kit
W3LL has developed an advanced phishing kit capable of bypassing multi-factor authentication (MFA)
The Perils of Phishing Attacks: MalDoc in PDF
MalDoc involves the use of polyglot files to embed malicious Word documents within benign-seeming PDFs
Exploitation of Vulnerabilities: A Cryptocurrency & Trading Nightmare
Hackers have actively exploited the WinRAR vulnerability to install malware by tricking users into opening seemingly harmless files in an archive.
Evolving Malware Attacks: Covert Attacks through LOLBAS
Living-off-the-Land Binaries and Scripts (LOLBAS) encompasses a collection of seemingly benign files that malicious actors exploit after compromising a system.
The Perils of Phishing Attacks: A Case Study on EvilProxy
EvilProxy, a popular phishing-as-a-service platform, utilizes reverse proxies and brand impersonation to steal Microsoft 365 account credentials, particularly targeting MFA-protected accounts
Detriments of Ransomware Threats: BlackByte 2.0
Ransomware attacks continue to escalate, and the recent investigation into BlackByte 2.0 ransomware reveals a concerning trend of rapid attacks with devastating consequences.
Evolving Malware Attacks: The DeliveryCheck Backdoor
Turla hacking group's recent attack using the DeliveryCheck malware poses a significant threat to the defence industry and Microsoft Exchange servers in Ukraine and Eastern Europe.
Evolving Malware Attacks: The LokiBot Trojan
LokiBot, an information-stealing Trojan active since 2015, primarily targets Windows systems with the aim of gathering sensitive information from infected machines.
Detriments of Ransomware Threats: The Big Head Deception
The Big Head ransomware is a recently emerged strain and has garnered significant attention due to its propagation through deceptive malvertising campaigns.
Detriments of Ransomware Threats: BlackCat’s New Attack Vector
BlackCat has emerged as a highly sophisticated and prominent ransomware group, making significant waves throughout 2021 and 2022.
Evolving Malware Attacks: The ChromeLoader Shampoo Campaign
The ChromeLoader campaign continues to evolve, with the discovery of the Shampoo browser extension variant.
Evolving Malware Attacks: A Microsoft Teams’ Vulnerability
Jumpsec’s security researchers have discovered a new technique that enables threat actors to deliver malware to organizations using Microsoft Teams.
CVE-2023-29336 Vulnerability Impacting Win32k Subsystem
CVE-2023-29336 is a local privilege escalation vulnerability that affects the Win32k subsystem in older versions of Windows.
The Perils of Phishing Attacks: A Case Study on DocuSign
The DocuSign phishing campaign involves, attackers sending deceptive emails that appear to be legitimate DocuSign notifications.