PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Featured

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Cloud SecurityCyber ThreatsFeatured

Royal Air Force Selects SecureCloud+ For Team Tempest Network Collaboration Services.

Reading & Farnborough 4 February 2019. SecureCloud+, a trusted provider of next-generation secure information systems to government and defence, has been contracted by the Royal Air Force to deliver network collaboration services for Team Tempest. Team Tempest is a global network of international partners formed by the Royal Air Force Rapid Capability Office (RCO) along with BAE Systems, Rolls Royce, MBDA and Leonardo. SecureCloud+ is the only SME to be part of the team, which is collaborating to meet a vision outlined in the…

APTAPT reportsCyber espionageFeaturedMalware DescriptionsSecurity FeedsTargeted Attacks

Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities

Executive Summary Throughout the autumn of 2018 we analyzed a long-standing (and still active at that time) cyber-espionage campaign that was primarily targeting foreign diplomatic entities based in Iran. The attackers were using an improved version of Remexi in what the victimology suggests might be a domestic cyber-espionage operation. This malware has previously been associated with an APT actor that Symantec calls Chafer. The malware can exfiltrate keystrokes, screenshots, browser-related data like cookies and history, decrypted when possible. The attackers rely heavily on Microsoft…

Cyber ThreatsFeaturedThe Internet of Things

Threat Spotlight: IoT Application Vulnerabilities Leave IOT Devices Open To Attack.

IoT devices were popular gifts again this holiday season. An acronym for Internet of Things, IoT is more than a buzzword. The trend represents a huge shift in how products are made and used, as network connectivity is added to products that were not previously intended to have this functionality. So, your refrigerator that sends you a text message when you’re out of milk: IoT. Your thermostat that provides usage graphs on your phone: yep, IoT. Basically, any consumer device capable of connecting to…

APTAPT reportsDropperFeaturedMalware DescriptionsSecurity FeedsSofacySpear PhishingTargeted Attacks

A Zebrocy Go Downloader

Last year at SAS2018 in Cancun, Mexico, “Masha and these Bears” included discussion of a subset of Sofacy activity and malware that we call “Zebrocy”, and predictions for the decline of SPLM/XAgent Sofacy activity coinciding with the acceleration of Zebrocy activity and innovation. Zebrocy was initially introduced as a Sofacy backdoor package in 2015, but the Zebrocy cluster has carved a new approach to malware development and delivery to the world of Sofacy. In line with this approach, we will present more on this…

Cyber ThreatsFeaturedThe Internet of Things

Parkbob Teams Up With Amazon At CES To Launch New Alexa Skill To Help You Park In Major U.S. Cities.

The Austrian start-up Parkbob has teamed up with Amazon to launch a new skill for Alexa-enabled devices at CES in Las Vegas, including the Anker Roav, Garmin Speak and soon, Echo Auto. The Parking Made Easy-Skill lets customers ask Alexa how long they can stay in their current parking spot or the location of the next multi-storey car park. Customers must opt-in for Alexa to share their location data with the skill through the Alexa app. Initially, the skill supports 13 of the largest…

Cyber ThreatsFeatured

IoMT Fraud Platform Cynerio Secures $7 Million Funding To Drive US Market Development.

Cynerio today announced the completion of its $7 million funding round to fuel growth in North America for its 100% healthcare focused cyber security platform. Investors include global VCs, Accelmed, a leading investment firm focused on value creation for medical device companies and technologies, RDC (a joint venture between Elron and Rafael), which invests in exceptional medical device and cybersecurity companies and MTIP, a leading venture capital firm who is an expert in digital health. “Cynerio is committed to protecting the future of healthcare…

Cyber ThreatsFeaturedThe Internet of Things

Multi-Purpose Attack Thingbots Threaten Internet Stability And Human Life.

New research from F5 Labs has revealed that IoT devices are now cybercriminals’ top attack target, surpassing web and application services, and email servers. Gartner currently estimates that the number IoT devices will surge to 20,4 billion by 20201, which represents a staggering 143% growth rate over three years. “IoT devices already outnumber people and are multiplying at a rate that far outpaces global population growth. Increasingly, lax security control could endanger lives as, for example, cellular-connected IoT devices providing gateways to critical infrastructures…

APTFeaturedMicrosoft WindowsProof-of-ConceptSecurity FeedsTargeted AttacksZero-day vulnerabilities

Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)

Executive summary In October 2018, our AEP (Automatic Exploit Prevention) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis led us to uncover a zero-day vulnerability in ntoskrnl.exe. We reported it to Microsoft on October 29, 2018. The company confirmed the vulnerability and assigned it CVE-2018-8611. Microsoft just released a patch, part of its December update, crediting Kaspersky Lab researchers Boris Larin (Oct0xor) and Igor Soumenkov (2igosha) with the discovery. This is the third consecutive exploited Local…

Featuredfileless malwareFinancial malwareSecurity FeedsSecurity PoliciesTargeted Attacks

DarkVishnya: Banks attacked through direct connection to local network

While novice attackers, imitating the protagonists of the U.S. drama Mr. Robot, leave USB flash drives lying around parking lots in the hope that an employee from the target company picks one up and plugs it in at the workplace, more experienced cybercriminals prefer not to rely on chance. In 2017-2018, Kaspersky Lab specialists were invited to research a series of cybertheft incidents. Each attack had a common springboard: an unknown device directly connected to the company’s local network. In some cases, it was…