Gagan CmThe MotW Unofficial Patch for Windows still lacks an IOCA maliciously signed file can bypass Mark-of-the-Web (MotW) security measures thanks to an actively exploited security hole in Microsoft…Nov 2, 2022Nov 2, 2022
Gagan CmLockBit 3.0 stolen data from ThalesThales’ information was purportedly stolen, according to the ransomware gang LockBit 3.0.Nov 2, 2022Nov 2, 2022
Gagan CmCode snippet in Ghost Blog platform, how does it work?You don’t have to be a programmer and focus most of your posts on coding to blog on the Ghost platform, Ghost is easier to use…Oct 20, 2022Oct 20, 2022
Gagan CmIndicators of Compromise (IOCs), what are they?Indicators of compromise (IOCs) are pieces of information that suggest a cyberthreat may have gained access to it. After a data breach or…Oct 20, 2022Oct 20, 2022
Gagan CmHackers uses a backdoored chat app to target Linux & MacOSSEKOIA’s Threat & Detection Research Team while review of the HyberBro Command and Control (C2) infrastructure linked to China-nexus…Aug 12, 2022Aug 12, 2022
Gagan CmQbot malware now uses windows calculator to infect devicesCyble analyst during a routine threat-hunting exercise found that Qbot malware has now begun using Windows Calculator to DDL side-load the…Jul 24, 2022Jul 24, 2022
Gagan CmAndroid wiping BRATA MalwareThe malware is called BRATA, which stands for Brazilian Remote Access Tool Android. It began as an Android RAT (remote access tool) and has…Jun 19, 2022Jun 19, 2022