Blog

June 25, 2018

Gear up for WannaCry 2.0

WannaCry 2.0 In The Making? After the disasters of WannaCry in the global cyberspace last year, and the on-going fiasco of cyber-attacks involving the name, it’s […]
March 16, 2018

A Ransomware called WannaCry

EXECUTIVE SUMMARY WannaCry is a family of Ransomware which when executed, encrypts certain file types on the system. The user must pay a ransom to the […]
February 13, 2012

ATM Skimming

Using an ATM machine is something we all do often but we do not realize the importance of protecting sensitive information while using an ATM. During […]
January 31, 2012

Carrier IQ

Carrier IQ also known as CIQ is a software that is installed not only on smartphones but also on tablets. Carrier IQ was developed to reduce […]
January 15, 2012

GPS Spoofing / Drone Hacking

Iran captured US stealth drone by spoofing its GPS coordinates which tricked the bird to land within the Iranian territory instead of where it was actually […]
September 2, 2010

Perils of the Pakistani IT manager

Though as abstract as the IT manager’s work may seem, life in the Pakistani corporate Diaspora does not come without perils and catches of its own. […]
May 15, 2009

Fired Employees Leaving With More Than Just Experience

With rampant downsizing in most organizations, corporations now face new frontiers in their efforts in keeping their data secured. Uncertainty amongst employees leads to more dubious […]
April 10, 2009

Acid test your Security with Penetration Testing

By Faiz Ahmad Shuja This article was featured in the April 2009 issue of CIO Pakistan’s CSO magazine.       In a cruel world, where even slow […]

Talk with an Expert

Provide your details to speak with a security expert.
Request a meeting
December 13, 2018

Rewterz Threat Advisory – Microsoft Edge Memory Corruption Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Microsoft Edge, which can be exploited by malicious people to compromise a vulnerable system.     IMPACT:  CRITICAL     […]
December 13, 2018

Rewterz Threat Advisory – CVE-2018-0732 – IBM Lotus Protector for Mail Security OpenSSL Denial of Service Vulnerability

A vulnerability has been reported in IBM Lotus Protector for Mail Security, which can be exploited by malicious people to cause a DoS (Denial of Service).   […]
December 12, 2018

Rewterz Threat Advisory – The SeedWorm APT targeting more than 30 organizations across continents

The SeedWorm APT group, aka MuddyWater, resurfaced with cyber-attacks across continents, mostly infecting Telecommunications and IT services.     IMPACT:  MEDIUM     PUBLISH DATE:  12-DEC-2018 […]
December 12, 2018

Rewterz Threat Advisory – Bagle worm returns with email spam campaigns

A fresh wave of mass-email spam campaign is detected, deploying the Bagle worm on Windows systems.     IMPACT:  MEDIUM     PUBLISH DATE:  11-DEC-2018   […]
December 11, 2018

Rewterz Threat Advisory – Satan Ransomware Variant Exploits 10 Server-Side Flaws

A new variant of Satan ransomware is spreading via around ten different vulnerabilities in Windows and Linux server platforms.     IMPACT:  MEDIUM     PUBLISH […]
December 10, 2018

REWTERZ THREAT ADVISORY – CVE-2018-19788 – LINUX POLICYKIT Command Execution Vulnerability

A new vulnerability allows a low-privileged user account on most Linux operating systems with UID value greater than 2147483647 to execute any systemctl command.     […]
December 6, 2018

Rewterz Threat Advisory – CVE-2018-5848 – Linux Kernel ‘wmi_set_ie()’ Buffer Overflow Vulnerability

A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to potentially gain escalated privileges.     IMPACT:  NORMAL   […]
December 6, 2018

Rewterz Threat Advisory – CVE-2018-15982 & CVE-2018-15983 – Microsoft Windows Adobe Flash Player Multiple Vulnerabilities

Two vulnerabilities in Adobe Flash Player can be exploited to execute arbitrary code on system, gain system access and acquire privilege escalation.     IMPACT:  CRITICAL […]
December 5, 2018

Rewterz Threat Advisory – A Malspam campaign circulating the Lokibot Malware

A Malspam campaign using authentic business subject as bait has been discovered, which drops and enables execution of Loki malware.     IMPACT:  NORMAL     […]