Estimated reading time: 3 minutes
Just like any other business, cybercriminals run their syndicate with the sole aim of maximizing profits. With that in mind, let us decipher the role of AI in cybercrime to rethink their business operating model. Shift in Targeted Cyber...
Estimated reading time: 3 minutes
Today enterprises face an ever-growing array of sophisticated threats that demand a comprehensive and proactive defense strategy. In the face of these growing cyber threats, CISOs are overwhelmed with managing numerous technologies, often leading to siloed capabilities and platform...
Estimated reading time: 4 minutes
AsukaStealer, marketed on a Russian-language cybercrime forum by the alias ‘breakcore,’ has been exposed. The perpetrator offers its services for a monthly fee of $80, targeting individuals and organizations seeking to exploit its capabilities for malicious purposes. Written in...
Estimated reading time: 5 minutes
Studies show that nearly 90% of cyberattacks and 70% of data breaches start at endpoint devices. Traditional security solutions like antivirus and firewalls are limited to detecting known threats and are ineffective against advanced attacks like social engineering, phishing,...
Estimated reading time: 4 minutes
In today’s rapidly evolving digital landscape, organizations are grappling with the challenges posed by remote and hybrid work models. As the traditional enterprise perimeter continues to erode, safeguarding sensitive data and critical applications has become a paramount concern for...
Estimated reading time: 11 minutes
In the recent past, cyberattacks on Indian government entities by Pakistan-linked APTs have gained significant momentum. Seqrite Labs APT team has discovered multiple such campaigns during telemetry analysis and hunting in the wild. One such threat group, SideCopy, has...
Estimated reading time: 4 minutes
Endpoint security is a critical aspect of protecting an organization’s network and data from evolving threats. As the sophistication and abundance of endpoint threats continue to grow, advanced endpoint security solutions are becoming increasingly necessary. These tools not only...
Estimated reading time: 6 minutes
Ghost Locker is a Ransomware-as-a-Service (Raas) created by GhostSec [hacktivist groups]. In October 2023, GhostSec launched the GhostLocker framework. After their successful collaborative operations with the Stormous ransomware group in July 2023, GhostLocker ransomware operators provide various options for...
Estimated reading time: 4 minutes
Recently, we came across a new banking trojan called Coyote, which utilizes a tool/library called Squirrel Installer, developed to install and manage updates of windows applications. The malware looks more evolved than our normal banking trojans and can potentially...