top of page

Business of Security

ORNA
Jan 17, 20234 min read
Users Struck by Banking Trojan Masquerading as 2FA App
What happens when scams aren’t so obvious but offer their users legitimate services as advertised?
31 views

ORNA
Jan 12, 20234 min read
Darkweb Sale of NATO Missile Secrets
In August of 2022, a cyber attack occurred against a European missile systems firm by an unidentified Russian hacker group, resulting in...
45 views

ORNA
Jan 10, 20234 min read
Hackers Plant Fake Digital Evidence in Campaign Targeting Human Rights Activists
ModifiedElephant has been in operation since “at least 2012” and is able to weaponize off-the-shelf remote access trojans.
36 views

ORNA
Jan 5, 20234 min read
Undetectable Phishing Attack Discovered in the Wild
This new method abuses third-party single sign-on (SSO) options that are embedded in websites.
39 views

ORNA
Jan 3, 20234 min read
Taking a Deeper Look Into New UEFI Invisible Rootkit
A persistent UEFI-based rootkit, referred to by the researchers as CosmicStrand, has remained extant since its first deployment in 2016.
120 views

ORNA
Dec 29, 20224 min read
An APP That Spies On Me
Privacy is prominently at the forefront of everything we do or interact with web related. If it's not, then we have a problem. After all,...
34 views

ORNA
Dec 27, 20224 min read
RTF Injection Techniques Rise With APT Phishing Attacks
Every year since its inception in the mid-1990s, phishing has prevailed as a popular attack vector among hackers of every hat.
28 views

ORNA
Dec 22, 20223 min read
Can SIM-Based Possession Factor Security Authentication Help Eliminate Phishing?
Phishing-based attacks are prevalent due to the easy exploitability of human nature.
20 views

ORNA
Dec 20, 20224 min read
Germany Gears Up to Fight Cyber Threats Against Space Infrastructure
If hackers turned their gaze toward the stars, these recommendations would ostensibly evolve into a government mandate.
11 views

ORNA
Dec 15, 20224 min read
Web Scans Leak 1.6M Secrets Leaks by Vulnerable Websites
Until people and companies alike adopt better security policies, vulnerabilities will prevail, and so will the bad actors that find them.
18 views
bottom of page