SMS PVA Part 2: Underground Service for Cybercriminals
In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications of such services.
In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications of such services.
Credit to Author: Jon Clay| Date: Fri, 25 Feb 2022 00:00:00 +0000
Recent cyberattacks increasingly target open-source web servers, and US officials tell businesses to watch for potential ransomware attacks after Biden announces Russia sanctions
Read more
As global tension rises, cyber-risk management and security fundamentals are the key to cyber-resilience
Credit to Author: Melanie Tafelski| Date: Tue, 22 Feb 2022 00:00:00 +0000
Explore how to implement 7 container security best practices within a CI/CD pipeline built with tools from Amazon Web Services (AWS).
Read moreCredit to Author: Jon Clay| Date: Tue, 22 Feb 2022 00:00:00 +0000
Malicious actors take advantage of people’s reliance on web servers to perform attacks like remote code execution, access control bypass, denial of service, or even cyberjacking the victim servers to mine cryptocurrencies.
Read more
In this three-part blog entry, our team explored SMS PVA, a service built on top of a global bot network that compromises smartphone cybersecurity as we know it.
Credit to Author: Luis Magisa| Date: Mon, 21 Feb 2022 00:00:00 +0000
A Mac coinminer has been spotted using open-source components in its routine and the I2P Network to hide its traffic. We dive into old iterations of this malware, and also analyze the newest version.
Read moreCredit to Author: Jon Clay| Date: Fri, 18 Feb 2022 00:00:00 +0000
SMS PVA services’ use of infected Android phones reveals flaws in SMS verification, and ‘Russian state-sponsored cyber actors’ cited in hacks of U.S. defense contractors
Read moreCredit to Author: Melissa Clow| Date: Wed, 16 Feb 2022 00:00:00 +0000
Discover the six pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.
Read more