News

61 Results / Page 1 of 7

Background

todayAugust 2, 2024

  • 90
  • 1
close

Breach + Incident Response + Penetration Testing + News Mjolnir Security

Security Risks of Insecure LDAP Connections

Abstract This research investigates the security risks associated with insecure LDAP connections, particularly in the context of VPN environments. By examining multiple connections over insecure networks such as and similar instances, this research highlights the vulnerabilities and potential exploits. The research delves into the fundamentals of LDAP, its role in ...

todayMay 30, 2024

  • 626
  • 1
close

News + Malware + Ransomware + Cybercrime + Incident Response Mjolnir Security

BlackSuit Ransomware Group

Background and History BlackSuit ransomware, a rebranded version of the infamous Royal ransomware, emerged in May 2023. This strategic rebranding was an attempt to evade intensified law enforcement scrutiny. Originating from the notorious Conti ransomware gang, BlackSuit quickly targeted high-profile sectors such as healthcare, education, and critical infrastructure, causing widespread ...

todayMay 2, 2024

  • 88
  • 2
close

News + Malware + Ransomware + Breach Mjolnir Security

Unlocking Awareness: Safeguard Your Digital Keys Against INC Ransomware Threats

INC Ransomware is a sophisticated cybercriminal group targeting organizations through complex cyberattacks. Here’s an explanation of their typical attack sequence and tactics designed for a non-technical audience in a business context: The sequence described utilizes various tactics, techniques, and procedures (TTPs) identified in the MITRE ATT&CK framework, which is a ...

todayMarch 6, 2024

  • 174
close

Botnet + Incident Response + News Mjolnir Security

Cobalt Strike: Understanding the Tool That Has Become a Staple in the Cyber Attacker’s Arsenal

Introduction In the realm of cybersecurity, the name “Cobalt Strike” often surfaces in discussions about sophisticated cyber attacks. It is a tool that has gained notoriety for its use in high-profile breaches and has become a term intertwined with the activities of threat actors. This blog post delves into the ...

News Mjolnir Security / March 2, 2024

AI Security Assessment

Overview: AI Security Assessment involves a comprehensive evaluation of the security measures surrounding AI systems to protect against cyber threats like adversarial attacks, data poisoning, and model theft. Key Features: Benefits to the Organization: Why Should an Organization Take the Services: Our Approach: How to Engage Mjolnir (Next Steps):

todayFebruary 29, 2024

  • 112
  • 1
close

News + Financial + Digital Forensics Mjolnir Security

Unlocking the Digital Evidence: The Power of eDiscovery Consulting with Mjolnir Security

In an age where digital communication forms the backbone of most business operations, the ability to sift through vast amounts of electronic data to find crucial evidence has become a cornerstone of legal proceedings. Mjolnir Security stands at the forefront of this digital frontier, offering specialized eDiscovery consulting services that ...

todayFebruary 26, 2024

  • 336
  • 1
close

News Mjolnir Security

Mjolnir Shield

Overview Mjolnir Security’s Post-Incident Response Restoration Service is designed to assist organizations in efficiently recovering from cybersecurity incidents. By focusing on rebuilding and enhancing IT, network, and security infrastructures, Mjolnir Security ensures that businesses not only return to their operational status quickly but also emerge stronger and more resilient against ...

todayNovember 5, 2023

  • 224
  • 1
close

Cyber security + Cybercrime + News + Malware + Botnet + Breach Mjolnir Security

Unraveling the Web of Sock5Systemz: Amadey and PrivateLoader Malware Revealed

In the realm of cyber threats, two names have emerged in recent times that have been causing a stir in the cybersecurity community: Amadey and PrivateLoader. Both are associated with a sophisticated malware called “Sock5Systemz”. In this post, we delve deep into the mechanics of these malwares, their Tactics, Techniques, ...