Avoiding Social Engineering and Phishing Attacks
What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.…
Read MoreTTCSIRT-019.070617: TT-CSIRT Advisory – CISCO Security Updates
Cisco has released updates to address vulnerabilities affecting multiple products. A remote attacker could exploit one of these vulnerabilities to take control of a system. Users and administrators are encouraged…
Read MoreTTCSIRT-018.070617: TT-CSIRT Advisory – Joomla Security Updates
Joomla has released version 3.7.3 of its Content Management System software to address several vulnerabilities: a) Core – Information Disclosure affecting Joomla 1.7.3-3.7.2 b) Core – XSS Vulnerability affecting Joomla…
Read MorePetya Ransomware Technical Intelligence Analysis
The Petya Ransomware successfully infected several industries including banks as well as media outlets, energy companies, power and utilities, telecoms, life sciences, transportation government agencies, airports and radiation monitoring equipment…
Read MoreExPetr/Petya/NotPetya is a Wiper, Not Ransomware
After an analysis of the encryption routine of the malware used in the Petya/ExPetr attacks, we have thought that the threat actor cannot decrypt victims’ disk, even if a payment…
Read MorePetya Ransomware Epidemic May Be Spillover From Cyberwar
When a ransomware outbreak exploded from Ukraine across Europe yesterday, disrupting companies, government agencies, and critical infrastructure, it at first appeared to be just another profit-focused cybercriminal scheme—albeit a particularly…
Read More