Our Blog

Stay in the know with news and information published by Ideal Technologies and other top tech news outlets across the globe.

Widespread Credential Phishing Campaign

Widespread Credential Phishing Campaign

Widespread credential phishing campaign abuses open redirector links Microsoft has been tracking a widespread credential phishing campaign using open redirector links, a feature that allows attackers to link to a trusted domain and embed...

New Mirai Variant Targets WebSVN

New Mirai Variant Targets WebSVN

New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305) A critical command injection vulnerability affecting WebSVN, an open-source web application for browsing source code, has been exploited in the wild to...

Emerging Ransomware Groups

Emerging Ransomware Groups

Emerging Ransomware Groups: AvosLocker, Hive, HelloKitty, LockBit 2.0 A look at some of the emerging ransomware groups that are currently affecting organizations and are likely to become more prevalent in the future, according to security...

Diavol – A New Ransomware Used By Wizard Spider

Diavol – A New Ransomware Used By Wizard Spider

A new family of ransomware called Diavol has been discovered and could be linked to a criminal group known as Wizard Spider, according to PSIRT research and a report published in the Security Research Journal. REFERENCE:...

Malware Masquerades as Privacy Tool

Malware Masquerades as Privacy Tool

Proofpoint researchers found a new threat enticing users to download malware by masquerading as a “Privacy Tools” service offering a tool that “encrypts” user data using a zip-like utility. The fake website is professional-looking and...

ChaChi: a New GoLang RAT

ChaChi: a New GoLang RAT

BlackBerry has identified a new type of malicious software written in the Go programming language as the operator of the PYSA ransomware campaign, which has been targeting education institutions across the United States and Canada....

Klingon RAT

Klingon RAT

With more malware written in Golang than ever before, the threat from Go-based Remote Access Trojans (RATs) has never been higher. Not only has the number of Go malware increased but also the sophistication of these threats. This is a...

Using cross-domain threat data to disrupt a large BEC campaign

Using cross-domain threat data to disrupt a large BEC campaign

Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via...

PRISM attacks manage to stay under the radar

PRISM attacks manage to stay under the radar

AT&T AlienLabs has recently come across some ELF executables that caught our attention as they had very low or zero anti-virus detections yet they were flagged as malicious by our analysis systems. Upon inspecting we identified them...