blackcat-ransomware

Evolution of Blackcat Ransomware

This threat bulletin gives insight into the Sphynx strain of the BlackCat ransomware that demonstrates how cybercrime strategies are always evolving.

Read More
gobrat-trojan

GobRAT trojan targets Japanese network infrastructures

This threat bulletin gives insight into the advanced remote access trojan GobRAT, which is majorly targeting Linux routers in Japan

Read More
michaelkors-ransomware

Impact of emerging RaaS MichaelKors on VMware ESXi Systems

This threat bulletin gives insight into the advent of the MichaelKors ransomware-as-a-service (RaaS), which targets Linux and VMware ESXi systems

Read More
greatness-phaas-platform

Greatness- A PhaaS platform risks Microsoft 365 Users

This threat bulletin gives insight into Greatness, a new Phishing-as-a-service platform which targets corporate customers of the Microsoft 365 cloud service

Read More
cactus-ransomware

The New Cactus ransomware self-encrypts to avoid antivirus

This threat bulletin gives insight into the Cactus ransomware, which uses known flaws in VPN hardware to get early access to the networks of well-known companies

Read More
decoy-dog-malware

Decoy Dog: Malware Toolkit Targeting Enterprise Networks

This threat bulletin gives insight into the malware toolkit Decoy Dog, identified by the cybersecurity organization Infoblox which uses smart evasive strategies.

Read More
outdated-wordpress-plugin

Outdated WordPress plugin lets hackers backdoor sites

This threat bulletin gives insight into the outdated WordPress plugin that lets threat actors covertly backdoor websites

Read More
legion-hacking-tool

'Legion', a Python-Based Hacking Tool appears on telegram

This threat bulletin gives insight into the python based hacking tool Legion, used by threat actors to penetrate internet services for exploitation.

Read More
dos-attack

NPM inundated with Fake Packages, Resulting in DoS Attack

This threat bulletin gives insight into the DoS assault that interrupted NPM and caused users to receive the "Service Unavailable" error message

Read More
alienfox-malware

AlienFox hackers target AWS, Google, and Microsoft API keys & secrets

This threat bulletin provides insight into the malware AlienFox, where attackers collect API keys and secrets from well-known services

Read More
shellbot-malware

Inadequately secured Linux Systems- Victims of ShellBot DDoS Malware

This threat bulletin gives insight into ShellBot, a DDoS Bot malware written in Perl and uses IRC protocols for connection

Read More
malware-attack

Hinatabot Targets on DDOS attacks

This threat bulletin gives insight into a recent Go-based botnet HinataBot, which specializes in initiating DDoS assaults and preys on Linux-based servers

Read More
batloader-malware

BATLOADER Malware Spreads Via Google Ads, Delivers Trojans

This threat bulletin gives insight into BATLOADER malware that utilizes google advertisements to convey optional payloads like Vidar stealer & Ursnif

Read More
vmware-vulnerability

Threat Actors use two-year-old VMware vulnerability for Ransomware

This threat bulletin gives insight into alert raised on threat actors actively exploiting a two-year-old VMware Exsi vulnerability to perform ExsiArgs ransomware attacks.

Read More
bluenoroff-intrusion

BlueNoroff (APT38) adopts new methods for intrusion

This threat bulletin gives insight into APT38 BlueNoroff, a threat group targeting majorly on financial institutions and their attack methodologies

Read More
qakbot-malware

Qakbot malware uses HTML smuggling for attacks

This threat bulletin gives insight into Qakbot malware, an attacker group majorly using HTML smuggling as their attack pattern, identified by Talos researchers

Read More
cuba-ransomware

Advisory issued on Cuba Ransomware

This threat bulletin gives insight into the Cuba ransomware attack group upon whom an advisory was issued by FBI and security agencies

Read More
redigo-malware

Redigo Malware in the Redis server

This threat bulletin gives insight into Redigo Malware detected by the Nautilus research team from Aqua security and the preventive measures to be taken

Read More
hive-threat-ransomware

Hive threat Ransomware group

This threat bulletin gives insight into the Hive threat ransomware group, who targeted more than 1300 companies acquiring 100 million USD approximately

Read More
dev-056-threat-group

DEV-056 finds new ways to deliver Royal ransomware

This threat bulletin gives insight into the threat group DEV-0569, finding new ways to deliver royal ransomware upon which MSTC has published a blog

Read More
icexloader-malware

IceXLoader Malware 3.3.3 actively used in phishing campaigns

This threat bulletin gives insight into the new version of IcexLoader malware which was actively used in phishing campaigns, its detection & preventive measures

Read More
daixin-team-ransomware

Daixin Team Ransomware targeting multiple organizations

This threat bulletin gives insight into a Ransomware group, Daixin team, that has been targeting organizations since June 2022 & its prevention

Read More
firefox-multiple-vulnerability

Multiple high severity vulnerability in Firefox

This threat bulletin gives insight into the multiple high to low-severity vulnerabilities seen in Mozilla products and their prevention

Read More
alchimist-and-insekt

New attack framework Alchimist and Insekt in wild

This threat bulletin gives insight into a new attack framework and malware Insekt discovered by the researchers of Cisco's Talos along with preventive measures

Read More
fortinet-products-vulnerability

Critical Remote Authentication Vulnerability in Fortinet Products

This threat bulletin gives insight into the critical vulnerabilities seen in multiple Fortinet products along with the preventative measures to be followed

Read More
microsoft-exchange-vulnerability

Zero-Day Vulnerabilities in Microsoft Exchange Server

This threat bulletin gives insight into the various Zero-day vulnerabilities found in Microsoft Exchange Servers and ways to mitigate & detect them

Read More
sophos-firewall-vulnerability

Critical Code injection vulnerability in Sophos Firewall

This threat bulletin gives insight into the exploitation of code injection vulnerability in the user portal and web admin of Sophos firewall and its prevention

Read More
zoom-application-vulnerability

Multiple High Severity Vulnerabilities in Zoom Application

This threat bulletin gives insight into the high-severity vulnerabilities discovered in Zoom which can cause unauthorized disruptions & the preventive measures

Read More
shikitega-malware

Shikitega Malware targeting endpoint devices running on Linux OS

This threat bulletin gives insight into the newly discovered malware Shikitega that actively targets endpoint devices running on Linux operating systems

Read More
chromium-based-browsers-vulnerability

High Severity Vulnerability in Chromium based Browsers

This threat bulletin gives insight into the Zero-day vulnerability identified in chrome and chromium based browsers like Microsoft Edge and ways to prevent them

Read More
gitlab-critical-vulnerability

Critical vulnerability in Gitlab- Remote Code Execution

This threat bulletin gives insight into the Remote Code Execution Vulnerability, a critical vulnerability found in GitLab, & its preventative measures

Read More
zeppelin-ransomware

Zeppelin Ransomware demands ransom in bitcoin

This threat bulletin gives insight into Zeppelin Ransomware, a RaaS, that targets various organizations, and how to detect them

Read More
rapperbot-malware

Rapperbot malware targeting SSH servers

This threat bulletin gives insight into a rapidly evolving malware Rapperbot upon which Fortinet had published a blog and on ways to detect them

Read More
lockbit-3-0-ransomware

Lockbit 3.0 Ransomware found by security researchers

This threat bulletin gives insight into Lockbit 3.0 Ransomware, found by the security researchers of SentinelOne, and ways to detect them

Read More
havanacrypt-ransomware

Havana Crypt Ransomware posed as a Google software update

This threat bulletin gives insight into HavanaCrypt, a ransomware that poses itself as a Google software update, along with the required prevention protocols

Read More
google-chrome-vulnerability

Google Chrome Zero-day Vulnerability

This threat bulletin gives insight into Google Chrome Zero-day vulnerability that can lead to RCE (Remote Code Execution), & how to safeguard yourself.

Read More
raccoon-stealer

Raccoon Stealer back with Version 2.0

This threat bulletin gives insight into the return of a major MaaS, Raccoon Stealer, & the preventive measures that can be taken to protect yourself against it.

Read More
splunk-vulnerability

Arbitrary Code Execution Vulnerability in Splunk Enterprise

This threat bulletin gives insight into the preventive measures that can be taken to address the vulnerability of arbitrary code execution in Splunk Enterprise.

Read More

Get in touch

Send us a Message

Looking for general information or have a specific question. Fill the form below or drop
us a line at susan@positka.com.