Do you have a GoDaddy hosted site? Has the site been acting strangely recently? Well, do I have a story for you…. GoDaddy webhosting breach GoDaddy, the Internet’s largest web host, headqu...
First seen in 2016, the mirai botnet has become one of the most notorious botnets the Internet has ever seen. And now it’s back with 13 new vulnerabilities to target! A bit of history Named afte...
Security researchers at Vedere Labs (part of Forescout Technologies) have recently released details of 56 different vulnerabilities across 10 OT (Operational Technology) companies devices in a securit...
In this blog, I take a look at the complex web which surrounds one of Russia’s most prolific hacking groups – Evil Corp, and the enormous malware campaigns they have been responsible for. ...
A few years ago I wrote a blog for the company I work for, where I mulled the idea that the GDPR (General Data Protection Regulations) could be used by threat actors as a weapon to cause financial dam...
Brazilian threat actors behind a modular and highly advanced point-of-sale (PoS) malware known as Prilex have updated their attacks that allow the malware to block contactless payment transactions. Si...
Last week, the United Kingdom and the united states placed sanctions on seven Russian nationals who are behind at least two of the most virulent ransomware campaigns seen in recent years. Members of t...
Threat actors, suspected to be from Russia have been targeting Eastern European users in the crypto industry with fake job opportunities as bait to install information-stealing malware on their device...
Gootkit – a malware which has been around since 2014 has recently been seen to have adopted a new mechanism of deployment, and attackers are using it to deliver Cobalt Strike and SystemBC on com...
It’s been a rough few weeks for hundreds of companies across the globe who operate their businesses with VMware’s ESXi server. A two-year-old Remote Code Execution (RCE) vulnerability is being u...