Tech Support

INDICATORS OF ATTACK (IOA) VS INDICATORS OF COMPROMISE (IOC)

WHAT’S THE DIFFERENCE? The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led manysecurity …

INDICATORS OF ATTACK (IOA) VS INDICATORS OF COMPROMISE (IOC) Read More »

Zero-Click Attacks against Smartphones

The rapid increasing use of smartphones for communications, such as banking and social networking, has made them an attractive target for cyber criminals. These malicious actors used social engineering to lure victims into clicking a malicious link or pressing a button, thereby causing the malware to execute, proliferate and compromise the victim’s smartphone successfully. However, …

Zero-Click Attacks against Smartphones Read More »

How to Investigate Twitter Trends

Trending list on Twitter seems to be a major criterion for the most important topics in circulation. Many journalists use Twitter to make editorial determinations, catering their coverage to what is perceived as popular – and analysis of “semantic similarity” between news reports has even revealed a link between what reporters see on their own …

How to Investigate Twitter Trends Read More »

How they do Anti-Forensic to Cover Digital Footprints

How they do Anti-Forensic to Cover Digital Footprints US lost over USD 4 billion to cyberattacks in 2020 (McCarthy, 2021). Along with this rise in cyber crime, advances in anti-forensic techniques have added new layers of complexity for digital forensic investigators. Anti-forensic techniques are designed to prevent individuals who commit cyberattacks from being discovered. In this …

How they do Anti-Forensic to Cover Digital Footprints Read More »

Critical Alert | Malware Strains 2022

The top malware strains of 2021 are: Agent Tesla, AZORult, Formbook, Ursnif, LokiBot, MOUSEISLAND, NanoCore, Qakbot, Remcos, TrickBot and GootLoader. Malicious cyber actors have used Agent Tesla, AZORult, Formbook, LokiBot, NanoCore, Remcos, and TrickBot for at least five years. Malicious cyber actors have used Qakbot and Ursnif for more than a decade. Updates made by …

Critical Alert | Malware Strains 2022 Read More »

Powershell Script to aid Live DFIR

Live Forensicator is part of the Black Widow Toolbox, its aim is to assist Forensic Investigators and Incidence responders in carrying out a quick live forensic investigation. It achieves this by gathering different system information for further review for anomalous behaviour or unexpected data entry, it also looks out for unusual files or activities and …

Powershell Script to aid Live DFIR Read More »

Should you apply Windows 11’s July security update or?

Windows 11’s security patches are lying to causing issues of their own, and that’s no dissimilar this month. After installing version KB5015814, users have complained of frequent problems with the Start menu, a crucial element of the user experience. For most people, it’s simply not value updating right now.   As reported by many users on …

Should you apply Windows 11’s July security update or? Read More »

error: Content is protected !!