Author: Prithesh Durai

Phishing and DDoS attacks on Ukraine

Phishing and DDoS attacks on Ukraine

“In the last 12 months, Threat Analysis Group (TAG) has issued hundreds of government-backed attack warnings to Ukrainian users alerting them that they have been the target of government-backed hacking, largely emanating from Russia.” wrote Shane Huntley, Google’s TAG lead. TAG has seen activity like espionage to phishing attempts from several threat actors, including FancyBear

Read More
Trojans are targeting Microsoft teams

Trojans are targeting Microsoft teams

A recent harmful campaign is taking control over end-user computers by placing malicious documents in Microsoft Teams chat. Cybercriminals have targeted Microsoft’s omnipresent document creation and sharing suite – the legacy Office and its cloud-based successor Office 365 – with assaults on individual apps like PowerPoint, as well as business email compromise and other schemes.

Read More
Hackers Infecting PCs With Windows Update Malware

Hackers Infecting PCs With Windows Update Malware

Trojanized version of IDA Pro: The North Korea state-sponsored group- Lazarus used a trojanized pirated version of the popular IDA Pro reverse engineering software (which translates machine language into assembly language) to target security researchers with available backdoors and remote access trojans. IDA Pro enables security researchers to analyze the malicious and debugger to detect

Read More
TOP 10 CYBER SECURITY BEST PRACTICES TO FOLLOW IN 2022

TOP 10 CYBER SECURITY BEST PRACTICES TO FOLLOW IN 2022

Educate your workforce about the importance of security and about the highly evolving threat landscape. Make these below mentioned practices a part of your work culture to prevent your organization from ransomware attacks: 1.Multi-Factor Authentication Multi-Factor Authentication is one of the most effective controls in preventing unauthorized access by bad actors. Authentication uses two or more

Read More