Search Results for: brute-force Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the... Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world... Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Knowledge Center REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen... Blog Post COVID-19 Outbreak in France Leads to Ransomware Attacks March 26, 2020 The increase of ransomware attacks in France has drawn serious government attention. Due to the global fear of the deadly... Blog Post GoldBrute Botnet Attacking RDP Servers June 8, 2019 A new botnet, GoldBrute, is making rounds on Windows systems running Remote Desktop Protocol (RDP). Renato Mainho, security researcher at... Blog Post 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday.... Blog Post Children’s Connected Toys Could be Hacker’s Target December 20, 2019 Nowadays, it is not surprising to hear that a lot of devices are having vulnerabilities, especially the IoT devices. However,... Blog Post Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car... Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it... Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a... Blog Post Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve... Blog Post Honeypots & Honeynets April 23, 2020 Because of the increasing complex evasion techniques and protocols with encryption technology for preventing eavesdropping, intrusion detection systems provide less...
Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the...
Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world...
Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...
Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being...
Knowledge Center REvil Sodinokibi Ransomware September 23, 2020 Overview During a recent client engagement, the LIFARS DFIR team encountered the REvil/Sodinokibi Ransomware group. The typical attack vector chosen...
Blog Post COVID-19 Outbreak in France Leads to Ransomware Attacks March 26, 2020 The increase of ransomware attacks in France has drawn serious government attention. Due to the global fear of the deadly...
Blog Post GoldBrute Botnet Attacking RDP Servers June 8, 2019 A new botnet, GoldBrute, is making rounds on Windows systems running Remote Desktop Protocol (RDP). Renato Mainho, security researcher at...
Blog Post 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
Blog Post Ransomware Gangs Now Threatening to Leak Valuable Information as Part of New Strategy February 11, 2021 Ransomware gangs are shaking up their tactics in the hopes of applying increasing pressure on companies and boosting their payday....
Blog Post Children’s Connected Toys Could be Hacker’s Target December 20, 2019 Nowadays, it is not surprising to hear that a lot of devices are having vulnerabilities, especially the IoT devices. However,...
Blog Post Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car...
Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it...
Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a...
Blog Post Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve...
Blog Post Honeypots & Honeynets April 23, 2020 Because of the increasing complex evasion techniques and protocols with encryption technology for preventing eavesdropping, intrusion detection systems provide less...