by bor1cua | Jul 30, 2024 | Cybersecurity Resources
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates a variety of information-stealing malware and netting them $100,000 in illicit profits over the past year. The...
by bor1cua | Jul 30, 2024 | Cybersecurity Resources
The remote access trojan known as Gh0st RAT has been observed being delivered by an “evasive dropper” called Gh0stGambit as part of a drive-by download scheme targeting Chinese-speaking Windows users. These infections stem from a fake website...
by bor1cua | Jul 30, 2024 | Cybersecurity Resources
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must encrypt their most valuable, sensitive data to prevent data theft and breaches. They also understand that...
by bor1cua | Jul 30, 2024 | Cybersecurity Resources
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint’s defenses to send millions of messages spoofing various popular companies like Best Buy, IBM, Nike, and Walt...
by bor1cua | Jul 12, 2024 | Cybersecurity Resources
The CIA Triad is a fundamental model in cybersecurity, representing the core principles that organizations must uphold to protect their data and systems. Let’s dive into each element of the triad: ConfidentialityConfidentiality ensures that sensitive...
by bor1cua | Jul 8, 2024 | Cybersecurity Resources
An emerging ransomware-as-a-service (RaaS) operation called Eldorado comes with locker variants to encrypt files on Windows and Linux systems. Eldorado first appeared on March 16, 2024, when an advertisement for the affiliate program was posted on the ransomware forum...