Kasseika Ransomware Utilizing BYOVD Technique to Bypass Pre-Encryption Security Measures
January 24, 2024
Kasseika, a ransomware gang, has recently started using the Bring Your Own Vulnerable Driver (BYOVD) attack to disable security processes on compromised Windows hosts. This group has joined other well-known groups such as Akira, AvosLocker, BlackByte, and RobbinHood in employing this technique. In…
0 Comments6 Minutes
Malware for MacOS Hides in Cracked Applications, Aiming to Attack Cryptocurrency Wallets
January 24, 2024
It has been noted that cracked software is infecting users of Apple macOS with a stealer malware that was not previously described. This malware is capable of harvesting information about the machine as well as bitcoin wallet data. Kaspersky, which discovered the artifacts in the wild, stated that…
0 Comments6 Minutes
If They Only Knew / The Power of Cyber Prevention
January 19, 2024
Join Dan and his co-host Andrew, a CEO with a strategic outlook, in their compelling live podcast, “If They Only Knew.” This podcast delves into the mantra: ‘An ounce of “cyber” prevention is worth a pound of headaches.’ Dan will lead the exploration,…
0 Comments1 Minutes
Security Issues Impact Citrix, VMware, and Atlassian; Apply Fixes Promptly!
January 18, 2024
Citrix has issued a security advisory regarding two publicly exploited zero-day vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (previously Citrix Gateway). The following are the shortcomings: The CVSS score for CVE-2023-6548 is 5.5. – Execution of authenticated,…
0 Comments5 Minutes
Opera Hackers Could Execute ANY File on Your Mac or Windows Due to a MyFlaw Bug
January 18, 2024
Cybersecurity researchers have identified a significant security vulnerability in the Opera web browser designed for both Windows and macOS platforms. This flaw exposes a potential threat where malicious actors could execute any file on the affected machine. The vulnerability is associated with a…
0 Comments7 Minutes
Hiring a Cybersecurity Analyst for Your Team
Security Audits & Penetration Testing
January 18, 2024
Data breaches and cyber attacks are becoming more common in today’s digital world, making protecting your organization’s critical information more crucial than ever. To better protect yourself from ever-changing cyber threats, it is wise to employ the services of a cybersecurity…
0 Comments10 Minutes
Update Chrome immediately to patch a newly discovered vulnerability that is now being exploited.
January 17, 2024
On Tuesday, Google released patches to solve four security concerns that were present in its Chrome browser. One of these flaws was a zero-day hole that was being actively exploited. The vulnerability, which has been assigned the identifier CVE-2024-0519, is related to an out-of-bounds memory…
0 Comments3 Minutes
Managed Detection and Response (MDR) // What is it?
January 16, 2024
Managed Detection and Response (MDR) // What is it? Hey guys! In this three-part series I share with you an in-depth exploration of Managed Detection and Response (MDR), a pivotal technique for minimizing cybersecurity breaches through early detection. 🔍 Inside This Video: I…
0 Comments1 Minutes
Managed Detection and Response (MDR) // Hacking Time!
January 16, 2024
Managed Detection and Response (MDR) // Hacking Time! Hey guys! In this video I do a hands-on, interactive demonstration of Managed Detection and Response (MDR) in action. We take a journey through the inner workings of MDR, showing its power in real-time detection and response…
0 Comments1 Minutes
Managed Detection and Response (MDR) // A Must Have!
January 16, 2024
Managed Detection and Response (MDR) // A Must Have! Welcome back to our series on Managed Detection and Response (MDR). In this third video, we delve deep into the reasons why MDR is essential for every company. After our previous discussions and demonstrations of MDR, this…
0 Comments1 Minutes