In 2012, almost a decade ago, a group of hackers called GhostShell carried out a series of attacks, targeting various government agencies and organizations worldwide. One of the most significant attacks carried out by the group was a SQL injection attack, which affected thousands of databases using the SQL query language developed to make database management a far easier task, but sadly threat actors figured out a way to abuse such an important computer science tool. This article discusses the GhostShell attack, focusing on the SQL injection attack.
In 2012, almost a decade ago, a group of hackers called GhostShell carried out a series of attacks, targeting various government agencies and organizations worldwide. One of the most significant...
Securing a cloud while meeting the need of developers and the business and supporting compliance initiatives, is difficult to say the least. Analyzing trends across user behavior, application...
Despite popular belief, implementing the tried and tested best practices has not reduced the frequency of ransomware or mitigated its devastating effects on victims' businesses. Meanwhile,...
Traditional Antivirus software seems to have reached end of the road. Put differently, it (antivirus) cannot protect the systems it is installed upon sufficiently. This might be deemed a...
In the realm of cyber threats, the landscape continues to evolve, taking on new and unexpected forms. Recently, the Vulcan Cyber Voyager18 research team brought to light a concerning Proof of...
In this article, we will explain what happened when MSI, a hardware manufacturer, suffered a ransomware attack that resulted in the leak of its UEFI signing keys and Intel Boot Guard keys. I will...
A new PowerShell malware is on the loose, targeting the US aerospace defense industry, and the sneaky threat actor is still at large! Dubbed "PowerDrop," this malware was spotted by the...
Fileless malware often also referred to as a malware-less attack, can be seen as any attack that uses native, legitimate tools built into a system to execute a cyber attack. In practice this...
The FBI warns that there is a new threat that seems to be growing in popularity. Cyber criminals are now harvesting personal information like photos and videos from online sources. In some of...
When it comes to security, a paradigm shift is necessary for the best cyber defense… Attackers have changed the rules of cyber security, and cyber defense and incident response is NOT what it...
Our security experts are standing by to help you with an incident or answer questions about our consulting and managed detection and response services.