Author: Jeyaraman Thiruvengadam

Policy Management Lifecycle – what, why, and how

Policy Management Lifecycle – what, why, and how

Reports say that addressing uncertainties is the condition that most organizations aren’t prepared for. But with a Governance, Risk, and Compliance program, it is easier to predict and address uncertainties and act with integrity. The GRC program is created to predict the risks, get prepared for them and protect yourselves from litigation. Over time, organizations

Read More
AstraLocker 2.0 – Smash and Grab attacks

AstraLocker 2.0 – Smash and Grab attacks

In 2021, Security researchers from ReversingLabs tracked a relatively unknown malware which was later named AstraLocker. The latest version of AstraLocker, meanwhile, was first observed in March 2022. Rather than the “Low and Slow” methodology that is common among sophisticated ransomware groups, this virus is so unique that it acts immediately after it a user

Read More
Roaming Mantis targets Android and iOS

Roaming Mantis targets Android and iOS

Roaming Mantis malware that targets Android and iOS devices is detected in France after hitting Germany, Taiwan, South Korea, Japan, the US, and the UK. This malware did compromise tens of thousands of devices and is believed to be a financially motivated threat actor, which was first reported in February 2022 targeting European users. MoqHao

Read More
ToddyCat APT unveiled

ToddyCat APT unveiled

Multiple threats detected from December 2020 against high-profile entities in Europe and Asia are finally traced to be responsible by a new Advanced Persistent Threat (APT) actor. Not much information about this is not yet gathered but its noticeable signs are the use of 2 previously unknown tools named “Samurai Backdoor” and “Ninja Trojan”. Since

Read More