Blog

September 15, 2020

Malware Analysis – AZORult Info Stealer

Introduction AZORult Trojan family was first observed in 2016. This Trojan is a highly sophisticated malware that steals information. Since 2016, different variants of AZORult have […]
September 14, 2020

Malware Analysis – Ursnif Trojan

Introduction Ursnif, also known as Gozi-ISFB or Dreambot, is a widely distributed banking Trojan. It attempts to steal banking credentials from customers of different financial institutions. […]
September 13, 2020

NetWalker Ransomware Hits K-Electric

Earlier this week, the sole electric power supply company of Karachi, Pakistan, was hit by a ransomware attack that affected their online services and billing processes. […]
June 26, 2020

Malware Analysis – Malicious Macros

Introduction Advanced Persistent Threat (APT-C-35) group, believed to be based in India, has been observed targeting government and military personnel in Pakistan using spear phishing emails. […]
June 22, 2020

Analysis on Sidewinder APT Group – COVID-19

Introduction Hardcore Nationalist group SideWinder is a threat group active since 2012 according to Kaspersky. This group mainly targets Pakistanis and Chinese military & government entities’ […]
June 15, 2020

Exposed Vulnerabilities and Their Impacts

Many users operating in the cyberspace are unaware of the curse of vulnerabilities. Being the initiating point of many cyber-attacks, vulnerabilities demand much more attention. These […]
June 8, 2020

Ransomware Attacks Surge in COVID19

Overview Commonly known as a malware from cryptovirology, Ransomware encrypts victim’s data and makes it inaccessible. The threat actors that operate a ransomware demand a ransom […]
June 2, 2020

Nanocore RAT Malware Analysis

About this Report The goal of this report is to provide actionable intelligence against threat actors along with malware or other tools they use for reconnaissance, […]
May 10, 2020

COVID-19 Remote Collaboration Challenges, Threats and Frauds in the Cyberspace

Overview Earlier in our blog, we listed many cyber-attacks launched by adversaries that were making use of the COVID19 fear to target victims. This blog reflects […]
May 1, 2020

4 Reasons Why You Should Outsource Your SOC

The Security Operations Center (SOC) is a specialized area of cyber security that maintains a detailed situational awareness of your organizational assets to prevent from threats […]
April 20, 2020

Sidewinder APT Group Campaign Analysis

Summary Hardcore Nationalist (HN2) aka Sidewinder APT Group, which has been working in the interest of Indian Government, has been observed targeting Pakistani Government Officials through […]
April 15, 2020

RagnarLocker Ransomware Hits EDP Energy Giant for $10.9M

Overview Attackers using the Ragnar Locker ransomware have encrypted the systems of Portuguese multinational energy giant Energias de Portugal (EDP) and are now asking for a […]

Talk with an Expert

Provide your details to speak with a security expert.
Request a meeting
May 25, 2009

How good are you at utilizing your Vulnerability Management program?

Here is our take on making the most of your vulnerability management system. Act right away! As much as people like to document their scan results […]
April 14, 2009

Guidelines for Setting Up a DLP

Planning to set up a Data Leakage Prevention (DLP) system for your company? With DLP systems costing as much as they do, its common for security […]