Search Results for: Microsoft Office software Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new... Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level... Blog Post Microsoft Released the First Patch Tuesday of 2021 for Defender Zero-Day and 82 Other Windows Flaws January 26, 2021 Recently, Microsoft has released security updates for 83 flaws in total on the first Patch Tuesday of 2021. The fixes... Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware... Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU.... Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash... Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal... Blog Post Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing...
Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new...
Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level...
Blog Post Microsoft Released the First Patch Tuesday of 2021 for Defender Zero-Day and 82 Other Windows Flaws January 26, 2021 Recently, Microsoft has released security updates for 83 flaws in total on the first Patch Tuesday of 2021. The fixes...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware...
Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of...
Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU....
Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities....
Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash...
Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal...
Blog Post Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing...