greatness-phaas-platform

Greatness- A PhaaS platform risks Microsoft 365 Users

This threat bulletin gives insight into Greatness, a new Phishing-as-a-service platform which targets corporate customers of the Microsoft 365 cloud service

Read More
cactus-ransomware

The New Cactus ransomware self-encrypts to avoid antivirus

This threat bulletin gives insight into the Cactus ransomware, which uses known flaws in VPN hardware to get early access to the networks of well-known companies

Read More
decoy-dog-malware

Decoy Dog: Malware Toolkit Targeting Enterprise Networks

This threat bulletin gives insight into the malware toolkit Decoy Dog, identified by the cybersecurity organization Infoblox which uses smart evasive strategies.

Read More
outdated-wordpress-plugin

Outdated WordPress plugin lets hackers backdoor sites

This threat bulletin gives insight into the outdated WordPress plugin that lets threat actors covertly backdoor websites

Read More
legion-hacking-tool

'Legion', a Python-Based Hacking Tool appears on telegram

This threat bulletin gives insight into the python based hacking tool Legion, used by threat actors to penetrate internet services for exploitation.

Read More
dos-attack

NPM inundated with Fake Packages, Resulting in DoS Attack

This threat bulletin gives insight into the DoS assault that interrupted NPM and caused users to receive the "Service Unavailable" error message

Read More
alienfox-malware

AlienFox hackers target AWS, Google, and Microsoft API keys & secrets

This threat bulletin provides insight into the malware AlienFox, where attackers collect API keys and secrets from well-known services

Read More
shellbot-malware

Inadequately secured Linux Systems- Victims of ShellBot DDoS Malware

This threat bulletin gives insight into ShellBot, a DDoS Bot malware written in Perl and uses IRC protocols for connection

Read More
malware-attack

Hinatabot Targets on DDOS attacks

This threat bulletin gives insight into a recent Go-based botnet HinataBot, which specializes in initiating DDoS assaults and preys on Linux-based servers

Read More

Get in touch

Send us a Message

Looking for general information or have a specific question. Fill the form below or drop
us a line at susan@positka.com.

Positka uses cookies to provide necessary site functionality and improved experience. By using our website, you agree to our privacy policy.