May 10, 2020

COVID-19 Remote Collaboration Challenges, Threats and Frauds in the Cyberspace

Overview Earlier in our blog, we listed many cyber-attacks launched by adversaries that were making use of the COVID19 fear to target victims. This blog reflects […]
May 1, 2020

4 Reasons Why You Should Outsource Your SOC

The Security Operations Center (SOC) is a specialized area of cyber security that maintains a detailed situational awareness of your organizational assets to prevent from threats […]
April 20, 2020

Sidewinder APT Group Campaign Analysis

Summary Hardcore Nationalist (HN2) aka Sidewinder APT Group, which has been working in the interest of Indian Government, has been observed targeting Pakistani Government Officials through […]
April 15, 2020

RagnarLocker Ransomware Hits EDP Energy Giant for $10.9M

Overview Attackers using the Ragnar Locker ransomware have encrypted the systems of Portuguese multinational energy giant Energias de Portugal (EDP) and are now asking for a […]
April 11, 2020

Rewterz Official Statement on the Reported Data Breach of 115M Pakistani Mobile Users

On Friday night at 12:15 AM our Threat Intelligence team published an advisory regarding Pakistani mobile user data being sold on the dark web for a […]
April 10, 2020

115 Million Pakistani Mobile Users Data Go on Sale on Dark Web

Rewterz, a pioneer of specialized cybersecurity services in Pakistan, has discovered a data dump of 115 million Pakistani mobile users data that have shown up for […]
April 6, 2020

Maze Ransomware Targets State-owned oil Company of Algeria

Overview Latest campaign of Maze ransomware has targeted and encrypted data from Berkine, a joint venture between Sonatrach, the state-owned oil company of Algeria, and the […]
March 30, 2020

COVID-19 Exploitation in Cyberspace

Overview The year 2020 has not been a great start for the world and the pandemic novel virus shares much of the blame. It seems just […]
February 20, 2020

Rewterz Informative Update : Ransomware Impacting Pipeline Operations

Severity High Overview CISA informs of a cyber-attack that was launched recently, affecting control and communication assets on the operational technology (OT) network of a natural […]
October 9, 2019

Here’s how VPNs can be Exploited by Attackers

Overview It is generally believed that data transfers are safest over a VPN connection. However, here is a bad news. They too are vulnerable and can […]
October 7, 2019

Outdated OS gets ATMs Hacked within minutes

While bank customers have a blind faith on the technologically advanced machine called ATM, it’s cyber security measures have shocking lapses and loopholes in most cases. […]
October 3, 2019

5 Cyber Security Measures to Avoid Getting Hacked

Cyber security is a continuous evolutionary process as new threats arise everyday. Apart from advanced security measures, it is advised to follow the following basic steps […]

Talk with an Expert

Provide your details to speak with a security expert.
Request a meeting
August 29, 2018

Rewterz Threat Advisory – Microsoft Windows ‘SchRpcSetSecurity()’ Privilege Escalation Vulnerability

 A vulnerability in Microsoft Windows Task Scheduler can be exploited to gain escalated privileges. IMPACT: MEDIUM PUBLISH DATE: 28-08-2018 OVERVIEW Elevated SYSTEM privileges can be gained […]
August 24, 2018

Rewterz Threat Advisory – Red Hat Update for postgresql

Red Hat has issued an update for postgresql. This fixes a vulnerability in which certain host connection parameters defeat client-side security defenses IMPACT:  CRITICAL   PUBLISH […]
August 23, 2018

Rewterz Threat Advisory – CVE -2018-11776 Apache Struts Remote Code Execution Vulnerability

A remote code execution vulnerability exists in various versions of Apache Struts which may take over the control of a system in case a successful attack. IMPACT:  […]
August 22, 2018

Disturbing Secrets Of The Deep And Dark Web

THE SURFACE WEB The billions of accessible websites on the internet today seem to be overwhelming for a common man. What’s more surprising is that these […]
August 21, 2018

Latest Favorite Platform for Zero-Day Exploits: Microsoft Office

Cybercriminals turn to Microsoft Office documents for conducting their zero-day exploits, using office files to execute remotely hosted malware. Cyberattacks are being launched using the most […]
August 17, 2018

Rewterz Threat Advisory – CVE-2018-8414 Microsoft Windows Shell Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Microsoft Windows that can provide user privileges to an attacker   IMPACT:  HIGH PUBLISH DATE:  16-08-2018 OVERVIEW Microsoft Windows […]
August 16, 2018

Running away from the pitfall of insecure browsing

This is an infomercial on understanding and avoiding insecure browsing to ensure cyber security and threat mitigation.   MAKING SURE THAT A WEBSITE IS HTTPS CONFIGURED  […]
August 16, 2018

Rewterz Threat Advisory – CVE-2018-6973 and CVE-2018-3646 VMWare Workstation Player Multiple Vulnerabilities

Multiple vulnerabilities are found in VMware Workstation Player which may result in disclosure of sensitive information and bypassing of certain security restrictions.   IMPACT:  CRITICAL PUBLISH […]
August 15, 2018

Rewterz Threat Advisory – CVE-2018-8374 Microsoft Exchange Server Tampering Vulnerability

A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. This may lead to unauthorized modification of system or user information.   […]