Select Page
Protecting Against Man-in-the-Browser Attacks

Protecting Against Man-in-the-Browser Attacks

If you’re entrenched with network security at your organization, you are most likely familiar with man-in-the-middle (MiTM) attacks. MiTM is a cybersecurity attack where the attacker injects himself in the middle of online communication between two parties. They can...
Look Out for Rapid Ransomware

Look Out for Rapid Ransomware

A new ransomware is being spread, aptly named “Rapid” Ransomware, which mostly leverages a social engineering attack vector using spam emails with malicious attachments. Rapid encrypted files are renamed with a .rapid extension. A ransom note is dropped in a form of a...
­Kovter – Stealthy Zero-Day Variant

­Kovter – Stealthy Zero-Day Variant

Kovter is seven years old trojan horse that started as ransomware tool, and then evolved into a full-fledged click fraud Trojan. During this evolution Kovter has changed its attack techniques, but its payload delivery methodology remained unchanged. Initially it was...