Operation Brightroar: Uncovering more attack pattern
After publishing our previous blog we got lots of similar attack sample from various sources. We found the attacker to be using various social engineering techniques. »
After publishing our previous blog we got lots of similar attack sample from various sources. We found the attacker to be using various social engineering techniques. »
A couple of days ago, we noticed that a few somewhat suspicious text messages, claiming to give the user "free internet" and other things, was being »
Conneczo is a web-based video calling and instant messaging application. It allows users to connect to other people without requiring to register on the site. After »
Nowadays most organization have an OPSEC team, they strive to place an effective defense to detect and mitigate custom-crafted attacks and infiltration. Traditional threat detection tools »
DLL hijacking is a decade-old vulnerability, and in mid-2010 it was all the rage when thousands of applications found vulnerable and even later some big names »