Category: Uncategorized

Policy Management Lifecycle – what, why, and how

Policy Management Lifecycle – what, why, and how

Reports say that addressing uncertainties is the condition that most organizations aren’t prepared for. But with a Governance, Risk, and Compliance program, it is easier to predict and address uncertainties and act with integrity. The GRC program is created to predict the risks, get prepared for them and protect yourselves from litigation. Over time, organizations

Read More
AstraLocker 2.0 – Smash and Grab attacks

AstraLocker 2.0 – Smash and Grab attacks

In 2021, Security researchers from ReversingLabs tracked a relatively unknown malware which was later named AstraLocker. The latest version of AstraLocker, meanwhile, was first observed in March 2022. Rather than the “Low and Slow” methodology that is common among sophisticated ransomware groups, this virus is so unique that it acts immediately after it a user

Read More
Roaming Mantis targets Android and iOS

Roaming Mantis targets Android and iOS

Roaming Mantis malware that targets Android and iOS devices is detected in France after hitting Germany, Taiwan, South Korea, Japan, the US, and the UK. This malware did compromise tens of thousands of devices and is believed to be a financially motivated threat actor, which was first reported in February 2022 targeting European users. MoqHao

Read More
Recent Ransomware attacks 2022

Recent Ransomware attacks 2022

Ransomware attacks have become very high in recent days. The ongoing attacks cause losses to lots of organizations. Knowledge of Ransomware and its anatomy is very important to mitigate these attacks. Some simple Protection and Response plans available can be useful in understanding the basics of the mitigation process. Let’s see some of the attacks

Read More