Ransomware
Part 3 De-Anonymizing Domains on the Dark Web – Favicon matching
Favicon Matching The second method that is used to uncover a dark web based website on the surface internet (clear internet) is the process of "favicon matching". A favicon is…
Read morePart 2 De-Anonymizing Domains on the Dark Web – TLS Certificate Matching
The first approach used by Cisco's Talos Threat Intelligence team was that of TLS certificate matching. With this approach the self signed certificate that is used by their dark web…
Read moreThe Ability to De-Anonymize Domains on the Dark Web
Members of the Cisco Talos Threat Intelligence team have developed 3 techniques to identify ransomware operators websites hosted on the dark web and their respective IP Addresses. This has given…
Read moreHow to Mitigate Malicious OneNote Attacks and the Indicators of Compromise
This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…
Read moreWho Is The Cl0p Ransomware Group?
The Cl0p ransomware gang is a notorious cyber criminal gang that is known for deploying ransomware attacks. They are associated with the deployment of sophisticated ransomware attacks. These attacks involve…
Read moreUnderstanding the costs of a ransomware attack
As time goes by Ransomware is becoming more virulent and a major threat to the digital landscape. The use of ransomware by cyber criminals makes it an effective and easy…
Read moreSigns To Watch Out For If You Suspect An Email To Be A Phishing Email
One of the many types of cyber crimes that are used by malicious threat actors is that of phishing. Phishing usually targets one or more individuals by email, telephone or…
Read moreWho are the hacking group LABYRINTH CHOLLIMA
Labyrinth Chollima, active since at least 2018 and originating from North Korea and also known as APT37 has been linked to the North Korean Government. (more…)
Read more