Email:

Phone No.

Whatsapp

Blog

Lazarus Hackers use Windows Update to Deploy Malware
Lazarus Hackers use Windows Update to Deploy Malware
Lazarus Hackers use Windows Update to Deploy Malware
Lazarus Hackers use Windows Update to Deploy Malware

Lazarus Hackers use Windows Update to Deploy Malware

Lazarus Hackers use Windows Update to Deploy Malware North Korean-backed hacking group Lazarus has added the Windows Update client to its list of living-off-the-land binaries (LoLBins) and is now actively using it to execute malicious code on Windows systems. The new malware deployment method was discovered by the Malwarebytes Threat Intelligence team while analyzing a January spearphishing campaign impersonating the American

Microsoft Warns of Multi-stage Phishing Campaign Leveraging Azure AD

Microsoft Warns of Multi-stage Phishing Campaign Leveraging Azure AD Microsoft’s threat analysts have uncovered a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices onto the target’s network and use them to distribute phishing emails. As the report highlights, the attacks manifested only through accounts that didn’t have multi-factor authentication (MFA) protection, which

Microsoft: Windows 11 Now in Broad Deployment for Eligible Devices

Microsoft: Windows 11 Now in Broad Deployment for Eligible Devices Microsoft says Windows 11 has now entered the broad deployment phase, making it available for everyone with an eligible device via Windows Update. This means that Windows 11 21H2, the latest release, will be offered to all Windows devices not affected by compatibility holds or configured to

Russian APT29 Hackers’ Stealthy Malware Undetected for Years

Russian APT29 Hackers’ Stealthy Malware Undetected for Years EXCLUSIVE: Hackers associated with the Russian Federation Foreign Intelligence Service (SVR) continued their incursions on networks of multiple organizations after the SolarWinds supply-chain compromise using two recently discovered sophisticated threats. The malicious implants are a variant of the GoldMax backdoor for Linux systems and a completely new malware

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us