Monthly Archives - August 2020

Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
MOBILE DEVICE SIDELOADING

MOBILE DEVICE SIDELOADING – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 3,

In our 3rd Episode of Season 2, we learn that a company’s payroll deposit went to hackers instead of employees, to the tune of $800,000.  While it might seem harmless at first , loading software from anywhere other than the manufacturer’s app store can be very risky.  Free is [...]

Read more...
Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System. On the first day of elementary school students starting online classes, the Haywood school system was hit by a ransomware attack. 1. How Ransomware Attack Shut Down School System? The attackers demanded a large amount of money to restore the system, but the ransom amount was not unveiled [...]

Read more...
REAL ESTATE WIRE FRAUD

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2 In our 2nd Episode of Season 2, a young family wires their 650k down payment for their new home to a fraudulent account. We come to find out that a hacker has taken over their real estate [...]

Read more...
Malware attacks have increased

Malware Attacks Have Increased 8 Times in the Last 10 Years

Malware attacks have increased 8 times in the last 10 years. Applications and devices must have machine IDs to securely communicate with each other upon authentication. However, whether it is a Kubernetes application or a serverless function in the cloud, machines prefer to use encryption keys and digital certificates used [...]

Read more...
Baiting

Baiting

In this blog, we are going to discuss Baiting which is a common method of a Social Engineering attack the others include phishing, pretexting, watering holes, quid pro quo and tailgating.  1. What is Baiting? Baiting is Phishing’s devious cousin. As the name suggests, Baiting involves luring an unsuspecting victim with [...]

Read more...
Taidoor RAT malware

New Chinese Malware – Taidoor

US government agencies say Taidoor malware has been around since 2008 and is a remote access Trojan (RAT) type of malware. 1. What is a RAT? (Remote Access Trojan)  It is a type of malware that causes hackers to have remote access to the device of the target user and to take [...]

Read more...
Watering Hole Attacks

Watering Hole Attacks

“What are watering hole attacks” and “how to mitigate them” have been some of the most frequently asked questions people are looking to find answers to today. In this article, we will cover the definition of watering hole attacks, provide some real examples, and conclude with measures that can [...]

Read more...
Bot Malware Attacking Financial Mobile Applications

Bot Malware Attacking Financial Mobile Applications

Last June, the FBI warned of a type of bot malware targets insecure banking and financial mobile applications, can leak sensitive information, capture and send passwords to the servers it communicates with, and gain accounts. This newly emerging mobile malware resembles the Trojan horse named EventBot, which appeared in April. [...]

Read more...
social engineering

Social Engineering

Social engineering attacks have many different tactics and can be initiated by a number of means targeting humans. Social engineering techniques vary, however, we will discuss the five most common forms of social engineering attacks.  1.What is a Social Engineering Attack? A Social Engineering Attack is a method of obtaining confidential [...]

Read more...