MITRE DoggyQR Code Phishing Attacks — Using Fake Official DocumentsA wave of QR code phishing attacks is targeting Chinese citizens by using fake official documents. These documents, masquerading as…Jun 19Jun 19
MITRE DoggySmishing (J&T Express) dan Dampaknya di IndonesiaThe Smishing Triad originates from China and uses smishing attacks as its primary attack vector. In September 2023, the group was found…Jun 17Jun 17
MITRE DoggyShinra RansomwareShinra ransomware, first seen in April 2024, encrypts files, deletes Volume Shadow Copies to inhibit recovery, and alters system settings…Jun 15Jun 15
MITRE DoggySecurity Vulnerabilities in Apple ProductsApple’s multiple products, including iOS, iPadOS, macOS, tvOS, watchOS, and Safari, have been identified with several critical…Jun 13Jun 13
MITRE DoggyThe Seizure of Cybercriminal Infrastructure: A Critical Blow to Cyber ThreatsIn the ongoing battle against cybercrime, law enforcement agencies worldwide have increasingly focused on seizing the infrastructure that…Jun 11Jun 11
MITRE DoggyUnderstanding Web Defacement: A Comprehensive GuideWeb defacement is a type of cyber attack where hackers infiltrate a website and alter its content without authorization. Think of it as…Jun 10Jun 10
MITRE DoggyThe Growing Threat of Social Engineering in CybersecuritySocial engineering attacks have become a prevalent and dangerous threat in the cybersecurity landscape. These attacks manipulate…Jun 7Jun 7
MITRE DoggyCybersecurity Challenges in the PhilippinesAs the Philippines continues to embrace digital transformation, the nation faces increasing cybersecurity challenges. With a growing…Jun 6Jun 6
MITRE DoggySecurity Vulnerabilities in Internet ExplorerMicrosoft Internet Explorer has been identified with numerous critical vulnerabilities. These vulnerabilities include memory corruption…Jun 6Jun 6