Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • Posts tagged "cyberSecurity"
  • Page 2

Tag: cyberSecurity

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

Sunday, 25 February 2024 by Ayman Hamam

Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign targeting two dozen organizations came to light. “Microsoft will automatically enable the logs in customer accounts and increase the default log retention period from 90

  • Published in News
Tagged under: Arab Security Consultants, ASC, Azure Active Directory, China-linked, Cyber espionage, Cyber Security, cyberSecurity, Data breach, logging capabilities, Microsoft 365, Microsoft Purview Audit, state-sponsored actors., Storm-0558, U.S. federal agencies

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty

Monday, 19 February 2024 by Ayman Hamam

A Ukrainian national has pleaded guilty in the U.S. to his role in two different malware schemes, Zeus and IcedID, between May 2009 and February 2021. Vyacheslav Igorevich Penchukov (aka Vyacheslav Igoravich Andreev, father, and tank), 37, was arrested by Swiss authorities in October 2022 and extradited to the U.S. last year. He was added to the

  • Published in News
Tagged under: Cybercrime, cyberSecurity, FBI, fraud., IcedID, Malware, money laundering, Raccoon, Ukrainian national, Zeus

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

Sunday, 11 February 2024 by Ayman Hamam

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that “Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period,” Check Point

  • Published in News
Tagged under: Cyber Threats, cyberSecurity, cybersecurity trends., exploit propagation, malware evolution, Malware Tactics, Ransomware, Raspberry Robin, threat actors, vulnerability exploitation

U.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks

Sunday, 04 February 2024 by Ayman Hamam

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) announced sanctions against six officials associated with the Iranian intelligence agency for attacking critical infrastructure entities in the U.S. and other countries. The officials include Hamid Reza Lashgarian, Mahdi Lashgarian, Hamid Homayunfal, Milad Mansuri, Mohammad Bagher Shirinkar, and Reza Mohammad Amin Saberian, who are part

  • Published in News
Tagged under: Albania's Institute of Statistics (INSTAT), CISA (Cybersecurity and Infrastructure Security Agency), Critical Infrastructure, critical services, cyber attacks, cyber operations, cyberSecurity, Cybersecurity Threats, data theft, Homeland Justice, humanitarian consequences, industrial control systems, Iranian hacktivist persona, Iranian intelligence agency, Iranian Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC), Iranian threat actors, Municipal Water Authority of Aliquippa, Office of Foreign Assets Control (OFAC), programmable logic controllers (PLCs), psychological operation group, sanctions, U.S. Treasury Department, unauthorized access., Unitronics, wiper malware

Three Ways To Supercharge Your Software Supply Chain Security

Sunday, 07 January 2024 by Ayman Hamam

Section four of the “Executive Order on Improving the Nation’s Cybersecurity” introduced a lot of people in tech to the concept of a “Software Supply Chain” and securing it. If you make software and ever hope to sell it to one or more federal agencies, you have to pay attention to this. Even if you never plan

  • Published in News
Tagged under: cyberSecurity, ethical hacking, secrets management, secure coding, software composition analysis, software development, software supply chain security, supply chain resilience., vulnerability management

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

Sunday, 03 December 2023 by Ayman Hamam

In a recent analysis, Palo Alto Networks Unit 42 researcher Chema Garcia revealed a targeted cyber threat affecting organizations in the Middle East, Africa, and the United States. The unknown threat actor is distributing a sophisticated backdoor named Agent Racoon, developed using the .NET framework. The malware exploits the domain name service (DNS) protocol to

  • Published in News
Tagged under: Africa, AgentRacoon, ASC, Backdoor, cyberSecurity, CyberThreat, DataExfiltration, DataSecurity, DNSProtocol, Egypt, HackerNews, InfoSec, ITSecurity, Malware, MiddleEast, Mimikatz, Ntospy, PaloAltoNetworks, SecurityAlert, TechNews, ThreatAnalysis, Unit42, US

Signal App Refutes Alleged Zero-Day Flaw Amidst Security Debates

Sunday, 29 October 2023 by Ayman Hamam

Signal, the renowned encrypted messaging app, has firmly pushed back against recent reports of an alleged zero-day vulnerability in its software. The company conducted a thorough investigation and stated that it found no concrete evidence to substantiate the claim. In a series of messages posted on social media platform X (formerly Twitter), Signal emphasized that

  • Published in News
Tagged under: Amnesty International Report, Cyber Threats, cyberSecurity, Data Security, Digital Privacy, Encryption, Signal App, Spyware Attacks, Vulnerability Market, Zero-Day Vulnerability

CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks

Sunday, 22 October 2023 by Ayman Hamam

Ukraine, a nation that has been no stranger to cyber threats, is again in the spotlight. The Ukrainian Computer Emergency Response Team (CERT-UA) has recently reported a series of cyberattacks targeting the country’s telecommunications providers. This alarming development raises concerns about critical infrastructure security and underscores the need for robust cybersecurity measures. In this blog

  • Published in News
Tagged under: Advanced Persistent Threats (APTs), CERT-UA, Critical Infrastructure, Cyber Threats, CyberAttacks, cyberSecurity, DDoS Attacks, Emergency Services, Geopolitics, Incident Response, International Security, National Security, Ransomware, Telecommunications, Ukrainian Telecom

Microsoft Warns of Cyber Attacks Attempting to Breach Cloud via SQL Server Instance

Sunday, 15 October 2023 by Ayman Hamam

In a recent cybersecurity incident, Microsoft has shed light on a thwarted cyber attack, where hackers made an unsuccessful attempt to breach a cloud environment through an SQL Server instance. The assault kicked off with the exploitation of an SQL injection vulnerability present in a particular application. This initial breach granted unauthorized access and escalated

  • Published in News
Tagged under: AzureSecurity, CloudResources, CloudSecurity, cyberSecurity, CyberThreats, DataSecurity, Hackers, IdentityManagement, IncidentResponse, SQLServer

The new malware ‘Letscall’ uses voice traffic routing to send audio

Monday, 10 July 2023 by Arab Security Consultants

A warning has been issued regarding a sophisticated form of voice phishing (vishing) called “Letscall” that specifically targets individuals in South Korea. This advanced technique involves deceiving victims into downloading malicious apps from a fake Google Play Store website. Once installed, the malware redirects incoming calls to a call center operated by criminals who pose

  • Published in News
Tagged under: CyberAttacks, cyberSecurity
  • 1
  • 2
  • 3
  • 4
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP