BEC and CEO fraud: a growing risk for companies
SPHINCS+: stateless hash-based digital signature
Introduction In early 2022, Telsy observed malicious cyber activity in the Microsoft Exchange infrastructure. The analysis conducted revealed the presence of a malicious DLL, called “fuscom.dll“, and its persistence by...
Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets....
TrickBot (or “TrickLoader”) is a banking Trojan that targets both businesses and consumers for their data, such as banking information, account credentials, personally identifiable information (PII), and even bitcoins. As...
FTCode is a type of ransomware that spreads itself via spam emails, and is able to execute its PowerShell-based malicious payload in memory only, without downloading any files to disk....
Ryuk is a ransomware family that first appeared in mid to late 2018. In December 2018, the New York Times reported that Tribune Publishing had been infected with Ryuk, forcing...
Turla is one of the most advanced APTs (Advanced Persistent Threat) in the world. Also, Turla Group is a well-established collective that has been operational since at least 2004 Also...
“APT”, the acronym for Advanced Persistent Threat, indicates a type of targeted and persistent attacks carried out by opponents with considerable technical expertise and great resources. As the “Advanced” part...
Locky is a type of malware that can encrypt critical files on your computer and hold them hostage while demanding a ransom payment. The cybercriminals promise to give users a...
An Evil Twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is...
Rootkits have coexisted with the computer world for over 20 years, allowing hackers to access (almost) any computer. What are Rootkits? First of all, Rootkits are malware, malicious software...