Self Assessment

Archives: Out of Band

THE CHANGING CYBER THREAT LANDSCAPE  ASIA-PACIFIC (APAC) REGION – Volume 3
2024-09-26
THE CHANGING CYBER THREAT LANDSCAPE ASIA-PACIFIC (APAC) REGION – Volume 3

EXECUTIVE SUMMARY The Asia Pacific (APAC) Threat Landscape Report provides a comprehensive overview

IRAN STEPS UP EFFORTS IN U.S. ELECTION MEDDLING
2024-09-25
IRAN STEPS UP EFFORTS IN U.S. ELECTION MEDDLING

As the U.S. presidential election in November approaches and the campaigns of former President Donald

CVE 2024-38856 – Pre-authentication Remote Code Execution (RCE) – Vulnerability Analysis and Exploitation
2024-09-24
CVE 2024-38856 – Pre-authentication Remote Code Execution (RCE) – Vulnerability Analysis and Exploitation

EXECUTIVE SUMMARY CVE-2024-38856 exposes a critical incorrect authorization vulnerability in Apache

Fortnightly Vulnerability Summary
2024-09-17
Fortnightly Vulnerability Summary

Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.

CYFIRMA INDUSTRY REPORT : REAL ESTATE & CONSTRUCTION
2024-09-16
CYFIRMA INDUSTRY REPORT : REAL ESTATE & CONSTRUCTION

EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven

Gomorrah Stealer v5.1: An In-Depth Analysis of a .NET-Based Malware
2024-09-13
Gomorrah Stealer v5.1: An In-Depth Analysis of a .NET-Based Malware

Executive Summary At Cyfirma, we are dedicated to providing current insights into prevalent threats

APT PROFILE – KIMSUKY
2024-09-12
APT PROFILE – KIMSUKY

Kimsuky is a North Korean hacking group identified as a moderately sophisticated cyber operator, active

CVE-2024-40725 and CVE-2024-40898 Vulnerabilities in Apache’s HTTP Server : Vulnerability Analysis and Exploitation
2024-09-11
CVE-2024-40725 and CVE-2024-40898 Vulnerabilities in Apache’s HTTP Server : Vulnerability Analysis and Exploitation

EXECUTIVE SUMMARY CVE-2024-40725 and CVE-2024-40898 are vulnerabilities in Apache’s HTTP Server.

BLX STEALER
2024-09-09
BLX STEALER

EXECUTIVE SUMMARY At CYFIRMA, we provide timely insights into emerging threats and malicious tactics

Tracking Ransomware – August 2024
2024-09-09
Tracking Ransomware – August 2024

EXECUTIVE SUMMARY August 2024 witnessed a noticeable increase in ransomware activity, with emerging

AILUROPHILE STEALER
2024-09-06
AILUROPHILE STEALER

EXECUTIVE SUMMARY At CYFIRMA, we are dedicated to delivering current insights into prevalent threats

DEEPFAKE DEFENSE STRATEGIC SOLUTIONS
2024-09-05
DEEPFAKE DEFENSE STRATEGIC SOLUTIONS

EXECUTIVE SUMMARY Deepfake is a rapidly evolving technology that leverages advanced artificial intelligence,

CYFIRMA RESEARCH : POWERSHELL KEYLOGGER
2024-09-02
CYFIRMA RESEARCH : POWERSHELL KEYLOGGER

EXECUTIVE SUMMARY At CYFIRMA, we are dedicated to delivering timely insights into emerging threats

ISRAEL – HEZBOLLAH Explainer
2024-09-02
ISRAEL – HEZBOLLAH Explainer

EXECUTIVE SUMMARY Since Israel launched its invasion of Gaza following the October 7 Hamas attack

Fortnightly Vulnerability Summary
2024-08-30
Fortnightly Vulnerability Summary

Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.

Analyzing the Mekotio Trojan
2024-08-29
Analyzing the Mekotio Trojan

EXECUTIVE SUMMARY At CYFIRMA, our commitment is to provide timely insights into prevalent threats

CYFIRMA INDUSTRY REPORT : PROFESSIONAL GOODS & SERVICES
2024-08-26
CYFIRMA INDUSTRY REPORT : PROFESSIONAL GOODS & SERVICES

EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven

A Comprehensive Analysis of Angry Stealer : Rage Stealer in a New Disguise
2024-08-23
A Comprehensive Analysis of Angry Stealer : Rage Stealer in a New Disguise

EXECUTIVE SUMMARY At CYFIRMA, we provide timely insights into emerging threats and malicious tactics

CVE-2024-30078 Remote Code Execution Vulnerability Analysis and Exploitation
2024-08-22
CVE-2024-30078 Remote Code Execution Vulnerability Analysis and Exploitation

EXECUTIVE SUMMARY CVE-2024-30078 reveals a severe vulnerability in the Wi-Fi drivers across multiple

Tactics and Motivations of Modern Hacktivists
2024-08-20
Tactics and Motivations of Modern Hacktivists

Training & Courses, Stealer Logs, Recruitments, Ransomware, Phishing, Monetizing, DDoS, Defacements,