Self Assessment

Archives: Out of Band

Tense China-Taiwan Relations
2023-02-03
Tense China-Taiwan Relations

Learning Lessons And From Russia’s War On Ukraine, ETLM Takeaways Introduction Over the last few

GuLoader Deploying Remcos RAT
2023-01-23
GuLoader Deploying Remcos RAT

Executive Summary Research team at CYFIRMA recently discovered a malicious PDF file being distributed

ChatGPT AI in Security Testing: Opportunities and Challenges
2023-01-21
ChatGPT AI in Security Testing: Opportunities and Challenges

Executive Summary ChatGPT, an advanced language model developed by OpenAI, has the potential to revolutionize

VagusRAT: A New Entrant in the External Threat Landscape
2023-01-14
VagusRAT: A New Entrant in the External Threat Landscape

Executive Summary Recently, researchers noticed various campaigns abusing Google Ads platform to deliver

Lessons from Russia’s cyber-war in Ukraine
2023-01-06
Lessons from Russia’s cyber-war in Ukraine

Lessons from Russia’s cyber-war in Ukraine In February of the last year just as Russian tanks started

VPS Exploitation by Threat Actors
2022-12-30
VPS Exploitation by Threat Actors

What About VPS A virtual private server (VPS) hosting offers a similar experience to dedicated hosting

ChatGPT AI Cybersecurity Potential
2022-12-23
ChatGPT AI Cybersecurity Potential

Executive Summary In recent weeks ChatGPT by OpenAI started making waves around the world for its

Multiple Campaigns by Russian Speaking Threat Groups Expanding their Attack Footprint
2022-12-15
Multiple Campaigns by Russian Speaking Threat Groups Expanding their Attack Footprint

Executive Summary CYFIRMA Research Team has been tracking three campaigns – Evian, UNC064, and

Inside the World of Initial Access Broker (IAB): Insights and Trends
2022-12-09
Inside the World of Initial Access Broker (IAB): Insights and Trends

Inside the World of Initial Access Broker (IAB): Insights and Trends Initial Access Brokers (IABs)

Privateering Cyber Report
2022-12-05
Privateering Cyber Report

Introduction The rise of the use of cyber criminals for privateering is a growing concern for organizations

Windows Internet Key Exchange (IKE) Remote Code Execution Vulnerability Analysis
2022-11-25
Windows Internet Key Exchange (IKE) Remote Code Execution Vulnerability Analysis

Windows Internet Key Exchange (IKE) Remote Code Execution Vulnerability Analysis (CVE-2022-34721)

From North Korean Phishing to Underground Online Hosting Services
2022-11-16
From North Korean Phishing to Underground Online Hosting Services

From North Korean Phishing to Underground Online Hosting Services Executive Summary During CYFIRMA’s

Prestige Ransomware Analysis
2022-11-10
Prestige Ransomware Analysis

Prestige Ransomware Analysis Executive Summary CYFIRMA Research team has seen an uptick in threat

Unknown Nation-Based Threat Actor Using Android RAT to Target Indian Defence Personnel
2022-11-07
Unknown Nation-Based Threat Actor Using Android RAT to Target Indian Defence Personnel

Executive Summary The CYFIRMA research team recently detected a malicious android APK targeting Indian

Phishing Attacks Leverage Deceptive Website Builders to Target AT&T Users
2022-10-31
Phishing Attacks Leverage Deceptive Website Builders to Target AT&T Users

Executive Summary The CYFIRMA research team observed threat actors using free website builders to

Fortinet Authentication Bypass Vulnerability Analysis – CYFIRMA
2022-10-27
Fortinet Authentication Bypass Vulnerability Analysis – CYFIRMA

Fortinet Authentication Bypass Vulnerability Exploited by Threat Actors EXECUTIVE SUMMARY A critical

Infostealer Prynt Malware a Deep Dive into Its Process Injection Technique
2022-10-14
Infostealer Prynt Malware a Deep Dive into Its Process Injection Technique

Infostealer Prynt Malware a Deep Dive into Its Process Injection Technique EXECUTIVE SUMMARY CYFIRMA

Advanced Social Engineering Attacks Deconstructed
2022-10-04
Advanced Social Engineering Attacks Deconstructed

EXECUTIVE SUMMARY The team at CYFIRMA has analyzed and researched social engineering attacks in depth.

Thousands of TP-Link Routers Vulnerable, Can be Exploited by Multiple Hackers
2022-09-28
Thousands of TP-Link Routers Vulnerable, Can be Exploited by Multiple Hackers

Thousands of TP-Link Routers Vulnerable, Can be Exploited by Multiple Hackers EXECUTIVE SUMMARY As

Erbium Stealer Malware Report
2022-09-25
Erbium Stealer Malware Report

Erbium Stealer Malware Report Executive Summary The Erbium malware is an information-stealer/ info