Our Blog

Stay in the know with news and information published by Ideal Technologies and other top tech news outlets across the globe.

Widespread Credential Phishing Campaign

Widespread Credential Phishing Campaign

Widespread credential phishing campaign abuses open redirector links Microsoft has been tracking a widespread credential phishing campaign using open redirector links, a feature that allows attackers to link to a trusted domain and embed...

New Mirai Variant Targets WebSVN

New Mirai Variant Targets WebSVN

New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305) A critical command injection vulnerability affecting WebSVN, an open-source web application for browsing source code, has been exploited in the wild to...

Emerging Ransomware Groups

Emerging Ransomware Groups

Emerging Ransomware Groups: AvosLocker, Hive, HelloKitty, LockBit 2.0 A look at some of the emerging ransomware groups that are currently affecting organizations and are likely to become more prevalent in the future, according to security...

Diavol – A New Ransomware Used By Wizard Spider

Diavol – A New Ransomware Used By Wizard Spider

A new family of ransomware called Diavol has been discovered and could be linked to a criminal group known as Wizard Spider, according to PSIRT research and a report published in the Security Research Journal. REFERENCE:...

Malware Masquerades as Privacy Tool

Malware Masquerades as Privacy Tool

Proofpoint researchers found a new threat enticing users to download malware by masquerading as a “Privacy Tools” service offering a tool that “encrypts” user data using a zip-like utility. The fake website is professional-looking and...

ChaChi: a New GoLang RAT

ChaChi: a New GoLang RAT

BlackBerry has identified a new type of malicious software written in the Go programming language as the operator of the PYSA ransomware campaign, which has been targeting education institutions across the United States and Canada....

Klingon RAT

Klingon RAT

With more malware written in Golang than ever before, the threat from Go-based Remote Access Trojans (RATs) has never been higher. Not only has the number of Go malware increased but also the sophistication of these threats. This is a...

Ideal Tech Offering Bigger Brains Online Training

Ideal Tech Offering Bigger Brains Online Training

Ideal Technologies is excited to announce our new service offering for online education and training services powered by Bigger Brains, an award-winning eLearning platform designed to produce a more productive workplace by empowering...

Using cross-domain threat data to disrupt a large BEC campaign

Using cross-domain threat data to disrupt a large BEC campaign

Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via...