After penetrating the company’s network, these criminals begin to collect credentials using common tools and TTP (tactics, methods and procedures). They use compromised credentials and the PsExec utility to move around the network and execute processes on other systems.
Tier3 monitoring teams have detected that Public Procurement Regulatory Authority (PPRA) official website ppra.org.pk was earlier this morning by a hacker group “The Crash Rulers” . It is the same group that supposedly hacked Pakistan […]
US officials say their attacks on Iranian military computers disabled systems that control missile and rocket launchers. The United States military launched cyberattacks against Iranian missile control systems and a spy network on Thursday after […]
Scanbox framework used to hack Pakistani Govt’s passport application tracking site http://tracking.dgip.gov.pk Experts uncovered a watering hole attack against the Pakistani Govt’s passport application tracking site, hackers used the Scanbox Framework to steal visitors’ data. […]
Hackers were able to use the vulnerability and install other malware on phones. After 2 Weeks WhatsApp confirms its 1.5 Billion users need an upgrade. WhatsApp the most popular messenger app, is also owned by […]
Fileless malware attacks are increasing every day.They can nowadays be seen as the perfect crime of opportunity. The initial vector of these attack can be a seemingly innocuous business email with a link to an […]
Even if security experts continue to make awareness campaign, people continue to use bad passwords exposing their data to the risk of hack. Bad habits are hard to die, 123456 is the most used password […]