September 28, 2020

Rewterz – 2020 Threat Intelligence Report

Rewterz has announced the release of the annual 2020 Threat Intelligence Report. The report is compiled from data gathered through our Security Operations Centers and sensors. Our […]
September 15, 2020

Malware Analysis – AZORult Info Stealer

Introduction AZORult Trojan family was first observed in 2016. This Trojan is a highly sophisticated malware that steals information. Since 2016, different variants of AZORult have […]
September 14, 2020

Malware Analysis – Ursnif Trojan

Introduction Ursnif, also known as Gozi-ISFB or Dreambot, is a widely distributed banking Trojan. It attempts to steal banking credentials from customers of different financial institutions. […]
September 13, 2020

NetWalker Ransomware Hits K-Electric

Earlier this week, the sole electric power supply company of Karachi, Pakistan, was hit by a ransomware attack that affected their online services and billing processes. […]
June 26, 2020

Malware Analysis – Malicious Macros

Introduction Advanced Persistent Threat (APT-C-35) group, believed to be based in India, has been observed targeting government and military personnel in Pakistan using spear phishing emails. […]
June 22, 2020

Analysis on Sidewinder APT Group – COVID-19

Introduction Hardcore Nationalist group SideWinder is a threat group active since 2012 according to Kaspersky. This group mainly targets Pakistanis and Chinese military & government entities’ […]
June 15, 2020

Exposed Vulnerabilities and Their Impacts

Many users operating in the cyberspace are unaware of the curse of vulnerabilities. Being the initiating point of many cyber-attacks, vulnerabilities demand much more attention. These […]
June 8, 2020

Ransomware Attacks Surge in COVID19

Overview Commonly known as a malware from cryptovirology, Ransomware encrypts victim’s data and makes it inaccessible. The threat actors that operate a ransomware demand a ransom […]
June 2, 2020

Nanocore RAT Malware Analysis

About this Report The goal of this report is to provide actionable intelligence against threat actors along with malware or other tools they use for reconnaissance, […]
May 10, 2020

COVID-19 Remote Collaboration Challenges, Threats and Frauds in the Cyberspace

Overview Earlier in our blog, we listed many cyber-attacks launched by adversaries that were making use of the COVID19 fear to target victims. This blog reflects […]
May 1, 2020

4 Reasons Why You Should Outsource Your SOC

The Security Operations Center (SOC) is a specialized area of cyber security that maintains a detailed situational awareness of your organizational assets to prevent from threats […]
April 20, 2020

Sidewinder APT Group Campaign Analysis

Summary Hardcore Nationalist (HN2) aka Sidewinder APT Group, which has been working in the interest of Indian Government, has been observed targeting Pakistani Government Officials through […]

Talk with an Expert

Provide your details to speak with a security expert.
Request a meeting
April 4, 2009

The Need for Data Leakage Prevention (DLP)

Many years ago, I remember watching a clip on TV about someone inventing a toilet that once locked, would not open unless it senses that someone […]