Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • Posts tagged "Cyber Threats"

Tag: Cyber Threats

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Tuesday, 11 March 2025 by Ayman Hamam

Threat hunters have shed light on a “sophisticated and evolving malware toolkit” called Ragnar Loader that’s used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil). “Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in networks for long-term operations,” Swiss cybersecurity company PRODAFT

  • Published in News
Tagged under: ASC, Cyber Threats, cyberSecurity, ethical hacking, FIN7, FIN8, InfoSec, Malware, Ragnar Loader, Ragnar Locker, Ransomware, Threat Hunting, Threat Intelligence

Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar

Monday, 04 November 2024 by Ayman Hamam

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and

  • Published in News
Tagged under: Advanced Threat Actors, ArabSecurityConsultants, ASC, cloud security, Cyber Defense, Cyber Threats, Cybersecurity Webinar, data breaches, Detection and Response, Identity Infrastructure, Identity Security, Identity-Based Attacks, IT Security, Lateral Movement, LUCR-3, SaaS Security, Scattered Spider

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

Sunday, 11 February 2024 by Ayman Hamam

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that “Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period,” Check Point

  • Published in News
Tagged under: Cyber Threats, cyberSecurity, cybersecurity trends., exploit propagation, malware evolution, Malware Tactics, Ransomware, Raspberry Robin, threat actors, vulnerability exploitation

New Malvertising Campaign Distributing PikaBot Disguised as Popular Software

Sunday, 24 December 2023 by Ayman Hamam

The malware loader known as PikaBot is being distributed as part of a malvertising campaign targeting users searching for legitimate software like AnyDesk. “PikaBot was previously only distributed via malspam campaigns similarly to QakBot and emerged as one of the preferred payloads for a threat actor known as TA577,” Malwarebytes’ Jérôme Segura said. The malware family, which first appeared in early 2023,

  • Published in News
Tagged under: AnyDesk, Cyber Threats, Cybersecurity Risks, Malvertising, Malware Tactics, PikaBot, Storm-0539, Threat Cluster

Microsoft Warns of Fake Skills Assessment Portals Targeting IT Job Seekers

Sunday, 12 November 2023 by Ayman Hamam

The well-known Lazarus Group has evolved, with a faction now setting up deceptive platforms masquerading as skill assessment portals, part of their new social engineering tactics. Identified by Microsoft as Sapphire Sleet, this alteration marks a change in the group’s persistent methods. Sapphire Sleet, also recognized as APT38, BlueNoroff, CageyChameleon, and CryptoCore, is notorious for

  • Published in News
Tagged under: Cyber Threats, Cybercrime, Cybersecurity Tactics, Hacker Techniques, Lazarus Group, macOS Malware, Malware Distribution, Sapphire Sleet, Social Engineering, Threat Actor

Signal App Refutes Alleged Zero-Day Flaw Amidst Security Debates

Sunday, 29 October 2023 by Ayman Hamam

Signal, the renowned encrypted messaging app, has firmly pushed back against recent reports of an alleged zero-day vulnerability in its software. The company conducted a thorough investigation and stated that it found no concrete evidence to substantiate the claim. In a series of messages posted on social media platform X (formerly Twitter), Signal emphasized that

  • Published in News
Tagged under: Amnesty International Report, Cyber Threats, cyberSecurity, Data Security, Digital Privacy, Encryption, Signal App, Spyware Attacks, Vulnerability Market, Zero-Day Vulnerability

CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks

Sunday, 22 October 2023 by Ayman Hamam

Ukraine, a nation that has been no stranger to cyber threats, is again in the spotlight. The Ukrainian Computer Emergency Response Team (CERT-UA) has recently reported a series of cyberattacks targeting the country’s telecommunications providers. This alarming development raises concerns about critical infrastructure security and underscores the need for robust cybersecurity measures. In this blog

  • Published in News
Tagged under: Advanced Persistent Threats (APTs), CERT-UA, Critical Infrastructure, Cyber Threats, CyberAttacks, cyberSecurity, DDoS Attacks, Emergency Services, Geopolitics, Incident Response, International Security, National Security, Ransomware, Telecommunications, Ukrainian Telecom
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP