Category: Uncategorized

Cyber Intelligence – How to Manage Cyber Crises
2023-03-20
Cyber Intelligence – How to Manage Cyber Crises

How Cyber crisis management and communication is changing Cyber crisis management and communication

Rethinking Cybersecurity in the Era of Digital Risk
2023-03-20
Rethinking Cybersecurity in the Era of Digital Risk

The year 2023 is likely to be an exciting one for businesses investing in digital risk1. With the

Data Breach – The Nightmare for Security Professionals
2023-03-10
Data Breach – The Nightmare for Security Professionals

As we delve deeper into the digital age, data has become a valuable asset for both individuals and

How to Choose the Best Digital Risk Management Platform
2023-01-18
How to Choose the Best Digital Risk Management Platform

What is Digital Risk Management Software? Digital risk protection services help organizations identify,

Evolving Cyber Threat Landscape Management in 2023
2023-01-09
Evolving Cyber Threat Landscape Management in 2023

The cyber external threat landscape is constantly evolving and it can be difficult for organizations

Windows Internet Key Exchange (IKE) Remote Code Execution Vulnerability Analysis
2022-11-25
Windows Internet Key Exchange (IKE) Remote Code Execution Vulnerability Analysis

Executive Summary CYFIRMA research team observed a series of exploits active in the wild targeting

From North Korean Phishing to Underground Online Hosting Services
2022-11-16
From North Korean Phishing to Underground Online Hosting Services

Executive Summary During CYFIRMA’s routine research on advanced persistent threat actors (APT)

Prestige Ransomware Analysis
2022-11-10
Prestige Ransomware Analysis

Executive Summary CYFIRMA Research team has seen an uptick in threat actor-orchestrated ransomware

Mirai – The Botnet that Made IoT Dangerous
2022-09-15
Mirai – The Botnet that Made IoT Dangerous

Introduction Mirai is a self-propagating botnet malware created by Paras Jha and his friends Josiah

Quantum Computing and Who is Leading the Cyber Arms Race
2022-07-28
Quantum Computing and Who is Leading the Cyber Arms Race

Why is the NIST worried about quantum computing when it’s going to take some time for it to become

Keksec and EnemyBot – From Edgy Teenagers To Serious Cybercriminals
2022-06-28
Keksec and EnemyBot – From Edgy Teenagers To Serious Cybercriminals

Introduction EnemyBot is a Linux-based botnet attributed to a threat group Keksec which is also known

What is going on with Lapsus$?
2022-04-13
What is going on with Lapsus$?

What’s going on with Lapsus$ By Adam Parsons, CYFIRMA Cyber Threat Intelligence  

A New World Order in the Making – Observations on the Latest Geopolitical Development and the Impact on Cybersecurity
2022-04-04
A New World Order in the Making – Observations on the Latest Geopolitical Development and the Impact on Cybersecurity

A New World Order in the Making – Observations on the Latest Geopolitical Development and the

RaidForums Users – Where is their Next Home?
2022-03-28
RaidForums Users – Where is their Next Home?

RaidForums Users – Where is their Next Home?   Requiring no introduction, the RaidForums(RF)

Look Inside Ransomware Gang Through Conti Leaks
2022-03-19
Look Inside Ransomware Gang Through Conti Leaks

Conti gang is one of the largest cybercrime syndicates in the world. Third-party blockchain analysis

Ways to Prevent Cyber Crime Even as IoT Technology Becomes Increasingly Prevalent in 2022
2022-03-01
Ways to Prevent Cyber Crime Even as IoT Technology Becomes Increasingly Prevalent in 2022

Ways to Prevent Cyber Crime Even as IoT Technology Becomes Increasingly Prevalent in 2022 As we move

Cyber Threat Landscape Expands with State-Sponsored Cyber Attackers
2022-02-19
Cyber Threat Landscape Expands with State-Sponsored Cyber Attackers

Cyber Threat Landscape Expands with Collaboration Between State-Sponsored Groups By CYFIRMA Research

Understanding Cyber Risk Related to Mobile Apps | Android Banking Trojan – Red Alert 2.0
2021-12-27
Understanding Cyber Risk Related to Mobile Apps | Android Banking Trojan – Red Alert 2.0

Understanding Cyber Risk Related to Mobile Apps | Android Banking Trojan – Red Alert 2.0  

Top 3 Ransomware Entry Points Used by Cyber Criminals
2021-12-07
Top 3 Ransomware Entry Points Used by Cyber Criminals

In the past 2 years, ransomware attacks have grown by leaps and bounds with the average ransom demand

TECHNICAL ANALYSIS OF SMOKELOADER MALWARE
2021-11-10
TECHNICAL ANALYSIS OF SMOKELOADER MALWARE

Risk Score: 8 Confidence Level: High Suspected Malware: SmokeLoader Malware Function: Mainly act to

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.