Uncategorized

QakBot Malware Delivered via Microsoft OneNote Files

Malicious OneNote file attachments in phishing emails are beginning to increase in January 21, 2023 as a new attack +1 (703) 740 2909 Home Enterprise Services Hire a Graduate Academy #Cyber Security Analyst Training Success Stories About us Who we are? Blog Contact QakBot Malware Delivered via Microsoft OneNote Files Executive Summary Malicious OneNote file …

QakBot Malware Delivered via Microsoft OneNote Files Read More »

OWASSRF- Microsoft Exchange Vulnerability Threat Brief

OWASSRF is a server-side request forgery vulnerability in Exchange Web Server, the OWASSRF exploit method +1 (703) 740 2909 Home Enterprise Services Hire a Graduate Academy #Cyber Security Analyst Training Success Stories About us Who we are? Blog Contact OWASSRF- Microsoft Exchange Vulnerability Threat Brief Executive Summary OWASSRF is a server-side request forgery vulnerability in …

OWASSRF- Microsoft Exchange Vulnerability Threat Brief Read More »

Qakbot Malware Campaign Using Google Drive Phishing Lure For Spreading

Qakbot is a modular information stealer also known as QBot or Pinkslipbot. It has been active for years since 20 +1 (703) 740 2909 Home Enterprise Services Hire a Graduate Academy #Cyber Security Analyst Training Success Stories About us Who we are? Blog Contact Qakbot Malware Campaign Using Google Drive Phishing Lure For Spreading Executive …

Qakbot Malware Campaign Using Google Drive Phishing Lure For Spreading Read More »

Threat Brief ProxyNotShell (CVE-2022-41040 and CVE-2022-41082)

In August 2022, Vietnamese Cyber Security company GTSC discovered a new Microsoft Exchange zero-day vulnerabilities +1 (703) 740 2909 Home Enterprise Services Hire a Graduate Academy #Cyber Security Analyst Training Success Stories About us Who we are? Blog Contact Threat Brief ProxyNotShell (CVE-2022-41040 and CVE-2022-41082) Executive Summary  Details of the Vulnerabilities GTSC’s researchers discovered the …

Threat Brief ProxyNotShell (CVE-2022-41040 and CVE-2022-41082) Read More »

Bumblebee Loader Infection Through Specially Crafted VHD Disk

In this report we will share our detailed analysis about the recent Bumblebee Loader campaign that is using VHD disk instead of ISO images +1 (703) 740 2909 Home Enterprise Services Hire a Graduate Academy #Cyber Security Analyst Training Success Stories About us Who we are? Blog Contact Bumblebee Loader Infection Through Specially Crafted VHD …

Bumblebee Loader Infection Through Specially Crafted VHD Disk Read More »

Scroll to Top