Cyber Security

Malware authors are continuously evolving their tactics to evade detection by security tools and sandbox evasion techniques are a critical component of this cat and mouse game In this comprehensive article we 8217 ll delve into the intricate details of the three primary categories of sandbox evasion techniques employed by

Introduction As the popularity of Linux and UNIX like operating systems has grown so too has the attention from malicious actors seeking to exploit vulnerabilities With the increasing adoption of these systems in various industries they have become lucrative targets for cyber attacks Consequently the belief that Linux is immune

The first step in defending your business against phishing is making sure that your employees know that these attacks exist and what they consist of VMRay s Abuse Mailbox enables Enterprise MSSP and MDR SOC teams to create a dedicated mailbox hosted by VMRay solutions allowing each client s employees

As mentioned in the previous post phishing emails that bypass perimeter and endpoint security controls is unfortunately quite common Many of the successful breaches that happen today just wouldn t if accuracy wasn t a problem According to multiple industry sources phishing is responsible for approximately 90 94 of successful

As technology advances phishing campaigns continue to improve in sophistication emphasizing the need for vigilance and awareness The recent spate of ransomware attacks on US healthcare has shown major chinks in the armor of many an organization s security stack Zero Day malware if unchecked can bring an organization quickly

Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks have been noteworthy We ve discussed the first incident that involves the BlackCat Ransomware as a Service RaaS Now let s continue with the second the return of LockBit 3 0 Part 3 Rhysida Another

Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks have been noteworthy We ve discussed the first incident that involves the BlackCat Ransomware as a Service RaaS Now let s continue with the second the return of LockBit 3 0 Part 2 The End

Ransomware One word that keeps many IT Administrators and SOC Analysts awake at night And when it comes to the healthcare industry the recent ransomware attacks of 2024 have led many IT security practitioners to burn the midnight oil late into the night Three Ransomware attacks and data breaches in

The recent data leak from a Chinese Security Services Company i Soon sent shockwaves through the CTI world The name i Soon is not new to the researchers monitoring China nexus private hacking industry This attention dates back to the US Grand Jury s indictment o employees from Chengdu 404

Overview The new guide released by the NSA alongside other agencies including CISA FBI DOE EPA TSA and international partners from the UK Canada Australia and New Zealand addresses the need for improved cyber defense measures against LOTL techniques This collaboration highlights the global nature of the threat and the

Uncover the truth of Cybersecurity, one story at a time

Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!

Subscribe to our Newsletter