vulnerabilities

Abusing Microsoft Office Online Video

  **Updated Note: As of November 12th, 2018, Trend Micro has discovered an in-the-wild sample of this logical bug seen in the TROJ_EXPLOIT.AOOCAI, using it  to deliver the URSNIF information stealer (TSPY_URSNIF.OIBEAO).** Cymulate’s research team has discovered a way to abuse the Online Video[...]

Cybercrooks are Laughing All the Way from the Bank

  Financial services firms are favorite targets for cyber criminals. The firms are a treasure trove of tradeable data varying from credit card credentials, customer information, and corporate data that can be abused or sold on the dark net. Compared to other industries, the financial sector still[...]

Cybercriminals are Industrious When Hacking Industries

  In recent years, cyber-attacks on industrial control systems and critical infrastructure all together have been on the rise. A recent study by Bitkom shows that cyber-attacks cost the German industry almost $50 billion. Those attacks are not limited to Europe’s strong economy. Hackers are known[...]

Cybercriminals Have an Unhealthy Appetite for Medical Data

  Cybercriminals just love targeting healthcare organizations and have been doing it quite often for many years. As can be seen on the table below, during the past couple of months cybercriminals have been working hard on these types of targets. where they hit with ransomware attacks or breach to[...]

Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part III

In our first blogpost about MITRE’s ATT&CK™ framework, we explained what it exactly is and how it contributes to cybersecurity. In our second blogpost, we dove deeper into the various features. In this blogpost, the third and final one in this series, we will discuss the future of MITRE’s[...]

Unpatched vulnerabilities provide an open door for Cybercrooks

Knock knock, whose there? A Cybercrook is exploiting known vulnerabilities to penetrate the organization for an easy picking.