top of page


The Stealthy Rise of FAUST Ransomware Through Innocent Office Documents
Imagine opening a simple office document and unknowingly letting a computer virus into your system. Researchers at Fortinet found a seemingly normal document that was hiding a nasty surprise: a type of computer virus called FAUST ransomware. This virus is a cousin of the already known Phobos ransomware, which has been causing trouble since 2019 […]
Jan 30, 2024


Bigpanzi Cybercrime Group’s Global Impact: Infecting Millions of Devices Since 2015
Introduction An unidentified cybercrime group, going by the name ‘Bigpanzi,’ has been quietly making a substantial income by infecting Android TV and eCos set-top boxes worldwide since at least 2015. According to researchers at Qianxin Xlabs in Beijing, this threat group manages a large botnet with around 170,000 active bots every day. However, they’ve identified […]
Jan 17, 2024


Beware of Deceptive Emails: Protecting Your 401(k) and HR Information from Sophisticated Phishing Attacks
Imagine you’re sifting through your inbox on a busy Monday morning. Amidst the usual mix of internal communications and project updates, you spot an email from your Human Resources department about your 401(k) plan. It mentions critical updates and requests your immediate attention. Before you click on any links or respond, pause and consider: Could […]
Jan 10, 2024


Navigating Cyber Threats in 2023: Unveiling 26,447 Vulnerabilities and Strategies for Resilience
In the year 2023, a total of 26,447 vulnerabilities were disclosed, marking an increase of over 1500 from the preceding year. This information is derived from the most recent report by the Qualys Threat Research Unit (TRU), released recently. Notably, less than 1% of these vulnerabilities are considered high-risk and are actively exploited by ransomware, […]
Dec 19, 2023
Ransomware Evolution: Unveiling the Threat of Ransomware-as-a-Service
Ransomware attacks are a big problem in the ever-changing world of online security. One particular concern is Ransomware-as-a-Service (RaaS), a trend that’s making cybercrime more accessible to people with limited technical skills. Traditionally, ransomware involves encrypting a victim’s files, making them inaccessible until a ransom is paid. However, modern attackers often go a step further. […]
Dec 12, 2023


Cybercriminals Utilize Google Workspace for Data Theft and Ransomware Deployment
A new report highlights innovative ways that cyber threats can exploit vulnerabilities in Google Workspace and the Google Cloud Platform. These methods, if exploited by malicious actors, could lead to ransomware attacks, data theft, and password recovery breaches. According to Martin Zugec, the Technical Solutions Director at Bitdefender, the threat begins with compromising a single […]
Nov 21, 2023


Unmasking Windows Driver Vulnerabilities: A Ticking Time Bomb
Security experts have recently uncovered a significant number of vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers, raising concerns about their potential exploitation by threat actors. This discovery reveals a severe risk in the digital landscape, as attackers, even without privileged access, could exploit these vulnerabilities to seize complete control of devices […]
Nov 6, 2023
1Password Detects Suspicious Activity After Okta Security Breach
1Password, a widely used password management solution, recently identified suspicious activity within its Okta instance, which occurred on September 29. The incident was associated with a support system breach but, reassuringly, no user data was compromised. Pedro Canahuati, the Chief Technology Officer (CTO) of 1Password, promptly responded to this security concern. He stated, “We immediately […]
Oct 24, 2023
HTTP/2 zero-day causes massive DDoS attacks
Over the preceding two months, malevolent actors have exploited a vulnerability in the HTTP/2 web communication protocol, rendering web application servers, load balancers, and web proxies susceptible to distributed denial-of-service (DDoS) attacks of an unprecedented magnitude. Major cloud infrastructure providers like Google, AWS, and Cloudflare, as well as web server vendors, have been collaborating on […]
Oct 11, 2023
Looney Tunables: A High-Severity Linux Bug Unleashes Root Access Chaos
A newly emerged software vulnerability, dubbed as ‘Looney Tunables‘ and cataloged under CVE-2023-4911, is causing a stir in the Linux community. The bug has opened up avenues for local attackers to gain root access on major Linux distros, thereby raising serious concerns about system integrity and security. The new Linux vulnerability, known as ‘Looney Tunables‘, […]
Oct 9, 2023
bottom of page
