Cyber Security
Malware authors are continuously evolving their tactics to evade detection by security tools and sandbox evasion techniques are a critical component of this cat and mouse game In this comprehensive article we 8217 ll delve into the intricate details of the three primary categories of sandbox evasion techniques employed by
Introduction As the popularity of Linux and UNIX like operating systems has grown so too has the attention from malicious actors seeking to exploit vulnerabilities With the increasing adoption of these systems in various industries they have become lucrative targets for cyber attacks Consequently the belief that Linux is immune
The first step in defending your business against phishing is making sure that your employees know that these attacks exist and what they consist of VMRay s Abuse Mailbox enables Enterprise MSSP and MDR SOC teams to create a dedicated mailbox hosted by VMRay solutions allowing each client s employees
As mentioned in the previous post phishing emails that bypass perimeter and endpoint security controls is unfortunately quite common Many of the successful breaches that happen today just wouldn t if accuracy wasn t a problem According to multiple industry sources phishing is responsible for approximately 90 94 of successful
As technology advances phishing campaigns continue to improve in sophistication emphasizing the need for vigilance and awareness The recent spate of ransomware attacks on US healthcare has shown major chinks in the armor of many an organization s security stack Zero Day malware if unchecked can bring an organization quickly
Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks have been noteworthy We ve discussed the first incident that involves the BlackCat Ransomware as a Service RaaS Now let s continue with the second the return of LockBit 3 0 Part 3 Rhysida Another
Three Ransomware attacks and data breaches in the healthcare industry over the last few weeks have been noteworthy We ve discussed the first incident that involves the BlackCat Ransomware as a Service RaaS Now let s continue with the second the return of LockBit 3 0 Part 2 The End
Ransomware One word that keeps many IT Administrators and SOC Analysts awake at night And when it comes to the healthcare industry the recent ransomware attacks of 2024 have led many IT security practitioners to burn the midnight oil late into the night Three Ransomware attacks and data breaches in
The recent data leak from a Chinese Security Services Company i Soon sent shockwaves through the CTI world The name i Soon is not new to the researchers monitoring China nexus private hacking industry This attention dates back to the US Grand Jury s indictment o employees from Chengdu 404
Overview The new guide released by the NSA alongside other agencies including CISA FBI DOE EPA TSA and international partners from the UK Canada Australia and New Zealand addresses the need for improved cyber defense measures against LOTL techniques This collaboration highlights the global nature of the threat and the
Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!