Ursnif Banking Trojan Claims More Victims | Avast

Recently, Avast Threat Labs researchers were able to obtain information on possible victims of Ursnif malware ...
Creating a VM in Ubuntu 18.04.3 LTS

How to Audit and Test for Sudo’s CVE-2021-3156 with LogRhythm

| | Customers, Threat Research
TL/DR Qualys has reported that Sudo, before 1.9.4p2, has a heap-based buffer overflow vulnerability that allows privileged escalation to root via “sudoedit -s” and a command-line argument that ends with a single ...
The Privilege Pathway

The Anatomy of the SolarWinds Attack Chain

Imagine there’s an attacker lurking inside your network right now. Do you have the ability to find out and respond before they can cause harm? Now imagine your adversary has privileged access to ...

Sextortion Email Scams | Avast

| | #popular, Threat Research
Sextortion is an emerging online scam that takes advantage of people’s fear that their most intimate moments will be exposed to the public. They usually come in the form of emails, which ...

Sextortion Email Scams | Avast

| | #popular, Threat Research
Sextortion is an emerging online scam that takes advantage of people’s fear that their most intimate moments will be exposed to the public. They usually come in the form of emails, which ...
Egregor Ransomware blog

Egregor Ransomware Adopting New Techniques

Introduction Egregor is considered to be one of the most prolific ransomware threat groups. Yet it gained this reputation in a very short time due to its uncompromising double extortion methodology ...
CinaRAT Resurfaces

CinaRAT Resurfaces With New Evasive Tactics and Techniques

Introduction In this post, we will be covering CinaRAT loader`s evasive TTPs (tactics, techniques, and procedures) as have been identified and prevented by Morphisec’s zero-trust endpoint security solution, powered by moving target ...
BlobHunter

Hunting Azure Blobs Exposes Millions of Sensitive Files

We hear about it all the time – data breaches that expose a company’s sensitive information. Nearly all of us have been warned that our passwords, email addresses or even credit cards ...
Think like an attacker

Breach of Trust: How Cyber-Espionage Thrives On Human Nature

With so much of daily life tethered to digital communication and most of our important information residing in data clouds, we’ve all got a lot riding in this virtual atmosphere. So naturally, ...

The ransomware threat to the healthcare sector

2020 has witnessed an uptick in ransomware attacks targeting hospitals and healthcare facilities. See, for example, C5 Capital Founder André Pienaar's account of a ransomware attack in the early days of COVID-19 ...