Upcoming Webinar: DPDP Act and Cybersecurity Essentials for Indian Manufacturers - 23rd July

Register Today

A report on Jenkins CVE-2024-23897 vulnerability

Critical Jenkins vulnerability (CVE-2024-23897) poses severe RCE threat, exposing organizations to remote code execution risks in CI/CD pipelines.

Read More

Ivanti Zero-Day Vulnerabilities: Connect Secure and IPS

Stay informed about critical vulnerabilities in Ivanti Connect Secure VPN and Policy Secure appliances exploited by UNC5221 since December 2023.

Read More

Unmasking Androxgh0st: A deep dive to safeguard your network

Stay vigilant against emerging cyber threats. FBI and CISA uncover Androxgh0st malware - explore tactics and strategies to strengthen your network defenses.

Read More

Evolving Threat: Unraveling the resurgence of Bandook RAT

This threat bulletin dives into the resurgence of the Bandook remote access trojan (RAT), offering a nuanced perspective on its historical evolution.

Read More

Defend against DLL Hijacking in Windows Environments

In this threat bulletin, we unravel the nuances of DLL hijacking, exploring not only its intricacies but also strategies to fortify our defenses.

Read More

Unveiling the Cloud Atlas Cyber Threat

In this threat bulletin, we delve into the recent activities of the sophisticated Cloud Atlas group, shedding light on their advanced methodologies.

Read More

PikaBot malware: Unveiling the malicious network

This threat bulletin gives insight into the malware PikaBot, a highly sophisticated loader that emerged in early 2023, including its distribution techniques.

Read More

Strategic threat analysis : MrAnon stealer malware campaign

Get an outline of MrAnon stealer malware, its evolution, potential threats & possible ways of improving Security Information and Event Management (SIEM) Systems

Read More

Security analysis and management of HRSERV.DLL in Windows OS

Look into the structure, functions, and possible system performance impacts of HRSERV.DLL, a very important Dynamic Link Library file in Windows OS.

Read More

OwnCloud vulnerability: Subdomain Validation Bypass

This threat bulletin provides an overview of the OwnCloud vulnerability, its consequences, and possible mitigation measures.

Read More

Kamran Android Spyware

Look into the new Android spyware called Kamran which recently emerged in the Gilgit-Baltista region, that targets people who speak Urdu.

Read More

Emerging Gootloader Malware Threat Evades defences

In this threat bulletin, let's look at the signature tactics, techniques, and procedures (TTPs) of GootLoader malware and dive into the new ways it gets around

Read More

Emerging SeroXen RAT malware

Take a look at the new malware threat, SeroXen RAT, which is a remote access trojan that’s been discovered, and discuss its implications for security.

Read More

Emerging Exelastealer malware threat

This paper examines the characteristics of ExelaStealer, the potential danger vectors connected to it, and offers mitigation strategies to lessen its effects.

Read More

ToddyCat APT Group Threat Analysis

Explore ToddyCat APT: Cyberespionage, Threats, & Defenses. Learn about their tactics, IOCs, and how to safeguard your organization.

Read More

Advanced phishing campaigns with EvilProxy

Stay informed about the latest malware threat EvilProxy, its evolution, SIEM rule updates, IOCs, and protective measures in this comprehensive report.

Read More

A report on BunnyLoader malware threat

BunnyLoader: Powerful C/C++ malware loader for cybercriminals, evading detection with fileless loading. Get insights on its dangerous capabilities.

Read More

A report on EvilBamboo threat actor

Explore evolving cyber threats: EvilBamboo's tactics targeting Taiwanese, Tibetan, and Uyghur communities exposed. Learn more.

Read More

BBTok Banking Trojan: Analysis and mitigation

Discover how to protect against BBTok banking trojans in Latin America. Analyzing threats, the latest changes, and mitigation strategies.

Read More

HijackLoader malware loader- traits and precautions

Explore HijackLoader virus traits, dangers, security tips, and the latest attack vectors and updates in this comprehensive study.

Read More

Blister malware: advancements and evasion

This threat bulletin gives insight into the ongoing Blister malware threats, evasion tactics, and strategies for enhanced defense.

Read More

Enhanced version released for KmsdBot malware

Upgraded KmsdBot malware targets IoT devices, signaling a concerning evolution in cyber threats. Organizations respond with heightened cybersecurity measures.

Read More

Emergence of advanced BlackCat ransomware variant

Discover Microsoft's findings on advanced BlackCat ransomware variant ALPHV using Impacket and RemCom for effective lateral movement & remote code execution.

Read More

JanelaRAT - A Targeted Financial Malware Threat in LATAM

Check out the bulletin update on JanelaRAT: Targeted financial malware in LATAM evading detection using DLL side-loading.

Read More

Reptile Rootkit and its mitigation strategies

Look into the Powerful Linux threat with stealth and reverse shell capabilities. Impacting South Korean systems, its GitHub debut sparked widespread attacks

Read More

The growing threat of AVrecon: Unraveling the Linux Botnet

AVrecon, a potent Linux virus, orchestrates a vast botnet of 70,000+ SOHO routers for bandwidth theft and illicit proxy services, empowering cybercriminals.

Read More

Dangerous HotRat - A variant of AsyncRAT malware

Beware the HotRat malware, a dangerous variant of AsyncRAT, spreading via pirated software downloads. Safeguard your system now

Read More

WormGPT- An AI tool for advanced cyber attacks

Discover WormGPT, a potent cybercrime AI tool automating the creation of deceptive emails, fueling successful phishing and BEC attacks.

Read More

BlackByte 2.0 ransomware attack investigation

Ransomware attacks plague businesses, with Microsoft's Response team uncovering alarming velocity and destruction of BlackByte 2.0 ransomware.

Read More

SQL injection vulnerabilities in Gentoo Soko

Discover critical SQL injection flaws in Gentoo Soko, a popular Go software module, which was exposed in March 2023 in this insightful threat bulletin.

Read More

Mockingjay process injection technique

Learn about Mockingjay process injection— an advanced technique evading security with threat actors leveraging DLLs & RWX permissions in Windows executables.

Read More

Adapting and evading detection by Vidar malware

Vidar malware operators adopt IP rotation, Moldovan & Russian providers to evade detection. Discover the evolving threat in this bulletin.

Read More

Visual Studio vulnerability- Malicious extension attacks

High-risk vulnerability discovered in Microsoft Visual Studio installer allows malicious actors to distribute dangerous extensions undetected.

Read More

Evolution of Blackcat ransomware

Explore the evolving cybercrime tactics with Sphynx strain of BlackCat ransomware in this insightful threat bulletin.

Read More

GobRAT trojan targets Japanese network infrastructures

Look into GobRAT, an Advanced Linux RAT targeting Japanese routers, exploits router vulnerabilities & impersonates Apache daemon for stealthy infections.

Read More

Impact of emerging RaaS MichaelKors on VMware ESXi Systems

Learn about MichaelKors RaaS, targeting Linux and VMware ESXi systems, in this revealing threat bulletin.

Read More

Greatness- A PhaaS platform risks Microsoft 365 Users

This threat bulletin gives insight into Greatness, a new Phishing-as-a-service platform which targets corporate customers of the Microsoft 365 cloud service

Read More

The New Cactus ransomware self-encrypts to avoid antivirus

This threat bulletin gives insight into the Cactus ransomware, which uses known flaws in VPN hardware to get early access to the networks of well-known companies

Read More

Decoy Dog: Malware Toolkit Targeting Enterprise Networks

This threat bulletin gives insight into the malware toolkit Decoy Dog, identified by the cybersecurity organization Infoblox which uses smart evasive strategies.

Read More

Outdated WordPress plugin lets hackers backdoor sites

This threat bulletin gives insight into the outdated WordPress plugin that lets threat actors covertly backdoor websites

Read More

'Legion', a Python-Based Hacking Tool appears on telegram

This threat bulletin gives insight into the python based hacking tool Legion, used by threat actors to penetrate internet services for exploitation.

Read More

NPM inundated with Fake Packages, Resulting in DoS Attack

This threat bulletin gives insight into the DoS assault that interrupted NPM and caused users to receive the "Service Unavailable" error message

Read More

AlienFox hackers target AWS, Google, and Microsoft API keys & secrets

This threat bulletin provides insight into the malware AlienFox, where attackers collect API keys and secrets from well-known services

Read More

Inadequately secured Linux Systems- Victims of ShellBot DDoS Malware

This threat bulletin gives insight into ShellBot, a DDoS Bot malware written in Perl and uses IRC protocols for connection

Read More

Hinatabot Targets on DDOS attacks

This threat bulletin gives insight into a recent Go-based botnet HinataBot, which specializes in initiating DDoS assaults and preys on Linux-based servers

Read More

BATLOADER Malware Spreads Via Google Ads, Delivers Trojans

This threat bulletin gives insight into BATLOADER malware that utilizes google advertisements to convey optional payloads like Vidar stealer & Ursnif

Read More

Threat Actors use two-year-old VMware vulnerability for Ransomware

This threat bulletin gives insight into alert raised on threat actors actively exploiting a two-year-old VMware Exsi vulnerability to perform ExsiArgs ransomware attacks.

Read More

BlueNoroff (APT38) adopts new methods for intrusion

This threat bulletin gives insight into APT38 BlueNoroff, a threat group targeting majorly on financial institutions and their attack methodologies

Read More

Qakbot malware uses HTML smuggling for attacks

This threat bulletin gives insight into Qakbot malware, an attacker group majorly using HTML smuggling as their attack pattern, identified by Talos researchers

Read More

Advisory issued on Cuba Ransomware

This threat bulletin gives insight into the Cuba ransomware attack group upon whom an advisory was issued by FBI and security agencies

Read More

Redigo Malware in the Redis server

This threat bulletin gives insight into Redigo Malware detected by the Nautilus research team from Aqua security and the preventive measures to be taken

Read More

Hive threat Ransomware group

This threat bulletin gives insight into the Hive threat ransomware group, who targeted more than 1300 companies acquiring 100 million USD approximately

Read More

DEV-056 finds new ways to deliver Royal ransomware

This threat bulletin gives insight into the threat group DEV-0569, finding new ways to deliver royal ransomware upon which MSTC has published a blog

Read More

IceXLoader Malware 3.3.3 actively used in phishing campaigns

This threat bulletin gives insight into the new version of IcexLoader malware which was actively used in phishing campaigns, its detection & preventive measures

Read More

Daixin Team Ransomware targeting multiple organizations

This threat bulletin gives insight into a Ransomware group, Daixin team, that has been targeting organizations since June 2022 & its prevention

Read More

Multiple high severity vulnerability in Firefox

This threat bulletin gives insight into the multiple high to low-severity vulnerabilities seen in Mozilla products and their prevention

Read More

New attack framework Alchimist and Insekt in wild

This threat bulletin gives insight into a new attack framework and malware Insekt discovered by the researchers of Cisco's Talos along with preventive measures

Read More

Critical Remote Authentication Vulnerability in Fortinet Products

This threat bulletin gives insight into the critical vulnerabilities seen in multiple Fortinet products along with the preventative measures to be followed

Read More

Zero-Day Vulnerabilities in Microsoft Exchange Server

This threat bulletin gives insight into the various Zero-day vulnerabilities found in Microsoft Exchange Servers and ways to mitigate & detect them

Read More

Critical Code injection vulnerability in Sophos Firewall

This threat bulletin gives insight into the exploitation of code injection vulnerability in the user portal and web admin of Sophos firewall and its prevention

Read More

Multiple High Severity Vulnerabilities in Zoom Application

This threat bulletin gives insight into the high-severity vulnerabilities discovered in Zoom which can cause unauthorized disruptions & the preventive measures

Read More

Shikitega Malware targeting endpoint devices running on Linux OS

This threat bulletin gives insight into the newly discovered malware Shikitega that actively targets endpoint devices running on Linux operating systems

Read More

High Severity Vulnerability in Chromium based Browsers

This threat bulletin gives insight into the Zero-day vulnerability identified in chrome and chromium based browsers like Microsoft Edge and ways to prevent them

Read More

Critical vulnerability in Gitlab- Remote Code Execution

This threat bulletin gives insight into the Remote Code Execution Vulnerability, a critical vulnerability found in GitLab, & its preventative measures

Read More

Zeppelin Ransomware demands ransom in bitcoin

This threat bulletin gives insight into Zeppelin Ransomware, a RaaS, that targets various organizations, and how to detect them

Read More

Rapperbot malware targeting SSH servers

This threat bulletin gives insight into a rapidly evolving malware Rapperbot upon which Fortinet had published a blog and on ways to detect them

Read More

Lockbit 3.0 Ransomware found by security researchers

This threat bulletin gives insight into Lockbit 3.0 Ransomware, found by the security researchers of SentinelOne, and ways to detect them

Read More

Havana Crypt Ransomware posed as a Google software update

This threat bulletin gives insight into HavanaCrypt, a ransomware that poses itself as a Google software update, along with the required prevention protocols

Read More

Google Chrome Zero-day Vulnerability

This threat bulletin gives insight into Google Chrome Zero-day vulnerability that can lead to RCE (Remote Code Execution), & how to safeguard yourself.

Read More

Raccoon Stealer back with Version 2.0

This threat bulletin gives insight into the return of a major MaaS, Raccoon Stealer, & the preventive measures that can be taken to protect yourself against it.

Read More

Arbitrary Code Execution Vulnerability in Splunk Enterprise

This threat bulletin gives insight into the preventive measures that can be taken to address the vulnerability of arbitrary code execution in Splunk Enterprise.

Read More

Get in touch

Send us a Message

Looking for general information or have a specific question. Fill the form below or drop
us a line at susan@positka.com.

Positka uses cookies to provide necessary site functionality and improved experience. By using our website, you agree to our privacy policy.