Guide to Container Management on AWS
This article explores how services provided by Amazon Web Services enable better container management with simplicity, flexibility, and complete control. Read More HERE…
This article explores how services provided by Amazon Web Services enable better container management with simplicity, flexibility, and complete control. Read More HERE…
The ransomware business model is poised to change. These four predictions could help to keep your organization secure from new forms of cyber extortion. Read More HERE…
We discovered an active campaign targeting Eastern Europeans in the cryptocurrency industry using fake job lures. Read More HERE…
In 2022, we discovered Earth Zhulong, a hacking group that has been targeting Vietnam’s telecom, technology, and media sectors similar to another well-known threat actor. In this article, we unravel their new tactics, techniques and procedures that they apply on their misdeeds. Read More HERE…
In 2022, we discovered Earth Zhulong, a hacking group that has been targeting Asian firms similar to another well-known threat actor. In this article, we unravel their new tactics, techniques and procedures that they apply on their misdeeds. Read More HERE…
In this investigation, we analyzed several prominent “passive income” applications and found out that there may be security risks upon participating in these programs. Read More HERE…
Cybersecurity risk assessment provides the continuous asset detection, analysis, prioritization, and risk scoring needed to keep pace with a continuously growing digital attack surface. Read More HERE…
We look into an ongoing malware campaign we named TgToxic, targeting Android mobile users in Taiwan, Thailand, and Indonesia since July 2022. The malware steals users’ credentials and assets such as cryptocurrency from digital wallets, as well as money from bank and finance apps. Analyzing the automated features of the malware, we found that the threat actor abused legitimate test framework Easyclick to write a Javascript-based automation script for functions such as clicks and gestures. Read More HERE…
In the era of digital transformation, ransomware groups are adapting to changing technology. The next evolution of ransomware could begin with these trends. Read More HERE…