Checkmate
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

Month: February 2022

The Supply Chain Cybersecurity Saga: Challenges and Solutions

February 28, 2022 Shalaka Patil 0

According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers focus most heavily on open-source [more]

Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products

February 16, 2022 Nandeesha B 0

Severity: Critical INTRODUCTION Adobe has addressed critical Magento Zero-Day Vulnerability (CVE-2022-24086) that is under active exploitation by threat actors. The security flaw impacts Adobe Commerce and Magento Open Source products. [more]

Breaking up on Valentine’s Day!

February 11, 2022 Shalaka Patil 0

Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals.  Cybercriminals always look for opportunities to take [more]

No Image

Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities

February 11, 2022 Nandeesha B 0

Severity: High Initial Access Broker (IAB) group Prophet Spider and an unknown threat group are actively attempting to exploit the Log4j vulnerability in VMware Horizon. Attack Chain:• In ongoing threat [more]

No Image

Threat actors are targeting critical organizations using destructive malware – “WhisperGate”

February 3, 2022 Nandeesha B 0

The threat campaign is referred to as Operation Bleeding Bear. The attacks are currently limited to Ukrainian government agencies and businesses; however, the attack seems to have evolved and sophisticated [more]

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 123 other subscribers

Top Posts

  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Bypassing Detection for a Reverse Meterpreter Shell
    Bypassing Detection for a Reverse Meterpreter Shell
  • Manipulating Host Headers - Not Anymore !
    Manipulating Host Headers - Not Anymore !
  • Password-less Remote Desktop Protocol (RDP) Session Hijacking
    Password-less Remote Desktop Protocol (RDP) Session Hijacking
  • Reverse Engineering x64 for Beginners - Windows
    Reverse Engineering x64 for Beginners - Windows
  • Passive Subdomain Enumeration (Part 1)
    Passive Subdomain Enumeration (Part 1)
  • SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
    SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Breaking up on Valentine’s Day!
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Holiday wishes from the CEO’s Desk!
  • Kickstart your holiday spirit with some cybersecurity binge watching!
Assessment C++ coding Cyber Security cybersecurity Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Copyright © 2022 | WordPress Theme by MH Themes