Email:

Phone No.

Whatsapp

Blog

Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins
Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins
Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins
Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins

Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins

Office 365 Phishing Runs Real-Time Check Of Stolen Domain Logins Threat researchers investigating phishing attacks encountered a less common technique in spear-phishing aimed at a senior executive at a top American company. The code behind the phishing page made sure that the threat actor got the right credentials for the company Active Directory and performed

New CDRThief Malware Steals VoIP Metadata From Linux Softswitches

New CDRThief Malware Steals VoIP Metadata From Linux Softswitches Malware researchers discovered a new threat that they named CDRThief targeting a specific Voice over IP system to steal call data records (CDR) from telephone exchange equipment. Analysis of the malware revealed that it was specifically created for a particular Linux VoIP platform, namely Linknat VOS2009/3000

BLURtooth Vulnerability Lets Attackers Defeat Bluetooth Encryption

BLURtooth Vulnerability Lets Attackers Defeat Bluetooth Encryption A vulnerability exists in certain implementations of Bluetooth 4.0 through 5.0 which allows an attacker to overwrite or lower the strength of the pairing key, giving them access to authenticated services. The bug was discovered independently by two teams of academic researchers and received the name BLURtooth. It

ProLock Ransomware Increases Payment Demand And Victim Count

ProLock Ransomware Increases Payment Demand And Victim Count Using standard tactics, the operators of ProLock ransomware were able to deploy a large number of attacks over the past six months, averaging close to one target every day. Following a failed start in late 2019, under the name PwndLocker, due to a crypto bug that allowed

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us