Select Page
Protecting Against Man-in-the-Browser Attacks

Protecting Against Man-in-the-Browser Attacks

If you’re entrenched with network security at your organization, you are most likely familiar with man-in-the-middle (MiTM) attacks. MiTM is a cybersecurity attack where the attacker injects himself in the middle of online communication between two parties. They can...
Look Out for Rapid Ransomware

Look Out for Rapid Ransomware

A new ransomware is being spread, aptly named “Rapid” Ransomware, which mostly leverages a social engineering attack vector using spam emails with malicious attachments. Rapid encrypted files are renamed with a .rapid extension. A ransom note is dropped in a form of a...
­Kovter – Stealthy Zero-Day Variant

­Kovter – Stealthy Zero-Day Variant

Kovter is seven years old trojan horse that started as ransomware tool, and then evolved into a full-fledged click fraud Trojan. During this evolution Kovter has changed its attack techniques, but its payload delivery methodology remained unchanged. Initially it was...
Why Demand Ransom When You Can Crypto Mine?

Why Demand Ransom When You Can Crypto Mine?

Since the onset of malware, the ability to make money by attacking companies has become a lucrative business. As attacks became more and more prevalent, enterprises invested more in protecting themselves. They hired and trained threat researchers, and as more...