-
I-S00N Leak Enigma
On February 17, 2024, a startling revelation shook the cybersecurity community worldwide when a new repository emerged on GitHub, unleashing a torrent of leaked communications and chat logs from a prominent Chinese company. GitHub, typically known as a platform for collaborative software development, unexpectedly became a conduit for what seemed like a significant data breach. The repository, ominously named I-S00N, appeared to be associated with APT-41 threat actors, signifying a potentially alarming development in the realm of cybersecurity as 2024 unfolds.
-
Investigating Trisec Outlaw Ransomware Group
The Trisec Outlaw group; made its debut on February 13, 2024, when it established both an onion website and a Telegram channel, marking its formal entry into the cyber realm. Merely four days later, on February 17, the group executed its first attack on a Cogans company, issuing a ransom demand with a 20-day ultimatum. Presently, the countdown stands at 19 days, heightening the urgency of the situation as the looming threat of data leakage looms large -
What is Ransomeare? How Does it work?
Ransomware is malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyberattackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files. Some variants have ad...
-
Reverse Shell Theory for beginners
A reverse shell is a shell session established on a connection initiated from a remote machine, not from the attacker’s host. Attackers who successfully exploit a remote command execution vulnerability can use a reverse shell to obtain an interactive shell session on the target machine and continue their attack. Reverse shells can also w...