Blog

May 10, 2020

COVID-19 Remote Collaboration Challenges, Threats and Frauds in the Cyberspace

Overview Earlier in our blog, we listed many cyber-attacks launched by adversaries that were making use of the COVID19 fear to target victims. This blog reflects […]
May 1, 2020

4 Reasons Why You Should Outsource Your SOC

The Security Operations Center (SOC) is a specialized area of cyber security that maintains a detailed situational awareness of your organizational assets to prevent from threats […]
April 20, 2020

Sidewinder APT Group Campaign Analysis

Summary Hardcore Nationalist (HN2) aka Sidewinder APT Group, which has been working in the interest of Indian Government, has been observed targeting Pakistani Government Officials through […]
April 15, 2020

RagnarLocker Ransomware Hits EDP Energy Giant for $10.9M

Overview Attackers using the Ragnar Locker ransomware have encrypted the systems of Portuguese multinational energy giant Energias de Portugal (EDP) and are now asking for a […]
April 11, 2020

Rewterz Official Statement on the Reported Data Breach of 115M Pakistani Mobile Users

On Friday night at 12:15 AM our Threat Intelligence team published an advisory regarding Pakistani mobile user data being sold on the dark web for a […]
April 10, 2020

115 Million Pakistani Mobile Users Data Go on Sale on Dark Web

Rewterz, a pioneer of specialized cybersecurity services in Pakistan, has discovered a data dump of 115 million Pakistani mobile users data that have shown up for […]
April 6, 2020

Maze Ransomware Targets State-owned oil Company of Algeria

Overview Latest campaign of Maze ransomware has targeted and encrypted data from Berkine, a joint venture between Sonatrach, the state-owned oil company of Algeria, and the […]
March 30, 2020

COVID-19 Exploitation in Cyberspace

Overview The year 2020 has not been a great start for the world and the pandemic novel virus shares much of the blame. It seems just […]
February 20, 2020

Rewterz Informative Update : Ransomware Impacting Pipeline Operations

Severity High Overview CISA informs of a cyber-attack that was launched recently, affecting control and communication assets on the operational technology (OT) network of a natural […]
October 9, 2019

Here’s how VPNs can be Exploited by Attackers

Overview It is generally believed that data transfers are safest over a VPN connection. However, here is a bad news. They too are vulnerable and can […]
October 7, 2019

Outdated OS gets ATMs Hacked within minutes

While bank customers have a blind faith on the technologically advanced machine called ATM, it’s cyber security measures have shocking lapses and loopholes in most cases. […]
October 3, 2019

5 Cyber Security Measures to Avoid Getting Hacked

Cyber security is a continuous evolutionary process as new threats arise everyday. Apart from advanced security measures, it is advised to follow the following basic steps […]

Talk with an Expert

Provide your details to speak with a security expert.
Request a meeting
February 5, 2011

In-depth Analysis of PDF Security

PDF, a portable file format, had gained popularity among general users due to its extensive features, portability and availability of free tools to read and author […]
February 4, 2011

Internet Explorer CSS 0day

Vulnerabilities, malwares and exploits have been out there since the existence of software themselves. Running with malicious intentions, these programs have always been a thorn in […]
February 3, 2011

Godaddy Web Interface Cross-Site Scripting (XSS) Vulnerability

Exploit Database recently found an interesting vulnerability regarding Godaddy which is a leading domain and website hosting provider. The Godaddy workspace XSS vulnerability provides liberty to […]