Tag: CTI

  • Forti-What Now? Breaches And How They Effect You 

    Forti-What Now? Breaches And How They Effect You 

    Recently, there has been a new wave of cyber-attacks that have caused quite a stir. From sextortion scams to social security breaches, there has been an insurmountable amount of new cybersecurity threats emerging every single day. Such activity can be very disheartening to those paying attention and can rear its ugly head in more ways… Read more

  • Predator Spyware: The Silent Stalker in The Digital Jungle

    Predator Spyware: The Silent Stalker in The Digital Jungle

    What is Predator? Could you imagine your phone, the device on which you keep all your sensitive data, have private conversations, and always keep on your person, has betrayed you? No clicks, weird downloads, not even an alert, and no mistakes on your part. Behind the scenes, a sneaky piece of software called spyware lurks… Read more

  • Pegasus Spyware Sextortion Scams – What You Need to Know

    Pegasus Spyware Sextortion Scams – What You Need to Know
    ,

    In recent years, cybercriminals have become increasingly adept at deploying a variety of phishing and extortion tactics to manipulate and intimidate unsuspecting victims. One of the more alarming threats involves the Pegasus spyware sextortion scam, a new twist on classic phishing schemes designed to frighten recipients into paying a ransom. Below, we’ll dive into the… Read more

  • The Psychology of Phishing

    The Psychology of Phishing

    But I’m smart! How did I get hacked?  Whether cognizant of our actions, or not, we all use forms of social engineering in our everyday lives.  Perhaps you praise a child to reinforce good behavior.  Did you unconsciously curate your social media to present only what you want others to see and therefore think about… Read more

  • The Connection Between Cobalt Sapling, Moses Staff, and Abraham’s Ax

    The Connection Between Cobalt Sapling, Moses Staff, and Abraham’s Ax

    Iranian-connected advanced persistent threat (APT) Cobalt Sapling was discovered in September of 2021, but evidence of their activity suggests being active since November of 2020. This hacktivist is known for anti-Israel sentiment, data extortion and encryption attacks and propaganda material among other things. Their motives appear to be solely political, as they never demand ransom… Read more

  • Is It Safe to Jailbreak ChatGPT? Uncover the Risks and Rewards!

    Is It Safe to Jailbreak ChatGPT? Uncover the Risks and Rewards!

    The term jailbreaking is the process of removing software restrictions or limitations imposed by the manufacturer or developer on a device or system. Most technology users most commonly associate this term with smartphones. In the context of Artificial Intelligence (AI) and large language models (LLM) like ChatGPT, jailbreaking refers to the process of bypassing the… Read more

  • Emerging Threat Review: Storm-0324 & Sangria Tempest 

    Emerging Threat Review: Storm-0324 & Sangria Tempest 

    The newest set of tactics, techniques, and procedures (TTPs) from Storm-0324, otherwise known as DEV-0324, reveals their use of Microsoft Teams to deliver malware through phishing messages and attachments. With corporate networks within their reach, this new evolution raises concerns for companies utilizing Microsoft Teams for day-to-day communications.   Analysis: A publicly available Python-based tool known as… Read more

  • Understanding 2FA vs MFA: A Layered Approach to Cybersecurity

    Understanding 2FA vs MFA: A Layered Approach to Cybersecurity

    In today’s digital landscape, ensuring robust security measures is paramount. With the ever-increasing sophistication of cyber threats, businesses and individuals alike must adopt rigorous authentication protocols. Two primary methods that stand out are Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA). While they are often used interchangeably, understanding their nuances is crucial for implementing the most… Read more

  • Demystifying SQL Injection and Database Security 

    Demystifying SQL Injection and Database Security 

    Structured Query Language or SQL is a programming language designed for creating, manipulating, and processing information stored in a relational database. These are made up of tables where information is stored and accessed using rows and columns to represent different data attributes and relationships. These databases are ubiquitous; even though we, the users, may not interact… Read more

  • Eldorado: The Golden City of Ransomware-as-a-Service (RaaS) 

    Eldorado: The Golden City of Ransomware-as-a-Service (RaaS) 

    In today’s rapidly evolving technological landscape, new cybercriminal threats are emerging alongside innovations. A ransomware group named Eldorado recently surfaced and, within a few months, successfully breached 16 companies worldwide, including in the United States. This malware poses a threat to both Windows and Linux systems, demonstrating that anyone can be a victim. Eldorado is… Read more