Apex One Zero-day Vulnerability
A zero-day vulnerability that was being actively exploited by malicious actors has been patched on the Apex One system and was announced by Trendmicro in a security advisory on Tuesday.
read moreThreat Nix is a Nepalese security firm providing cyber security services to clients around the globe. It has a team of security professionals with combined experience of 20+ years and that understands your business and key objectives.
A zero-day vulnerability that was being actively exploited by malicious actors has been patched on the Apex One system and was announced by Trendmicro in a security advisory on Tuesday.
read moreIntroduction Bumblebee is a backdoor with unique modular architecture and has a string embedded in the malware.
read moreDarkTortilla is a .NET-based crypter that works by delivering numerous malicious payloads, with the potential to inject illegal content into the user system with the ability to manipulate both users and sandboxes to believe that it is benign.
read moreWhat are macros? Simply stating, macros are Microsoft programs or instructions that can be used to automate repetitive tasks in any of the Microsoft office programs or applications.
read moreClickjacking tricks a user into performing a particular action on a target website where they assume that they are clicking on one element, but instead, they would be clicking a webpage element that is invisible or disguised as another element.
read moreSHARPEXT is a malicious browser extension that has recently been used by a threat actor (SharpTongue) to target several systems.
read moreEvilNum is a backdoor malware that can be used to steal data or load extra payloads with a number of intriguing components to avoid detection and alter infection paths based on well-known antivirus software.
read moreRaspberry Robin is a cluster of malicious activity that involves a worm that is installed via USB drives and can compromise QNAP devices using HTTP requests containing the victim’s device and username.
read moreAs a spawn ofRansomware-as-a-Service(RaaS) amongst threat actors, Maui ransomware lacks several features but is getting closer to enclosing itself as a part of the group.
read moreA path traversal security vulnerability was discovered in the UnRAR binary, which when exploited can result in remote code execution (RCE) on the commercial email platform Zimbra, as well as other software.
read moreBRATA is an Android mobile malware that is a rapidly evolving, feature-packed banking trojan.
read moreHertzbleed is aside-channel attack that aims toexfiltrate sensitive information such as cryptographic keys from the system that uses an x86 processor.
read moreA zero-day remote code execution vulnerability was identified and shared by Nao_sec through Twitter, which reported finding a malicious Word file designed to execute arbitrary PowerShell code.
read moreWhile most the users normally face malicious email campaign attacks in a form of a word document recently a campaign was discovered that used malicious PDF files to hide and spread keylogger malware.
read moreA novel malware variant was attached to emails with embedded malicious capabilities and was spread leveraging the Covid-19 theme through multiple industries in Europe.
read moreThreat Nix has uncovered a large scale phishing campaign using GitHub pages and targeted Facebook ads that has affected more than 615000 users.
read moreLast Saturday, June 29, 2019, a group calling themselves Black Hawk Caphilates released a list of 37,122 email addresses, supposedly belonging to Nepali people and claimed it to be the largest email leak in Nepal’s history.
read moreAs with last year, Threat Nix has continued in its effort to assess the state of security of Nepali cyberspace with its annual Threat Report.
read moreTHREAT CON 2018 – Nepal’s First Hackers’ Convention organised by ThreatNix was successfully concluded on 23rd November.
read moreThreatNix is happy to announce that we have now added IS audit to our already substantial list of cybersecurity related services.
read moreNepal Government, in a surprising move, has made provisions for all government employees to be issued official email address (of the form *@mail.
read moreThe Drupal team publicly acknowledged a serious vulnerability in the open source CMS Drupal on March with the release of a patch to address the vulnerability.
read moreThe recent scandal of Facebook’s user data being harvested for use for election manipulation by Cambridge Analytica has brought the issue of data security to wider public discussion.
read moreDarknet is a concealed part of the Internet that is specially designed to ensure the anonymity of users.
read moreThreat Report 2017 is a comprehensive report that has analysed the security of Nepali cyberspace.
read moreThis is a short post about a vulnerability that Prakash Sharma from our web app pentesting team, found in Microsoft Edge.
read moreA large breach in the Aadhaar card system has recently come into light.
read moreThe recent case of two Nepali online news portal being embedded with web based cryptocurrency miners have brought the issue of security of Nepali websites to public discussion.
read moreIt has been discovered that OnlineKhabar, a reputed Nepali news website was abusing users’ trust by using readers computing resources’ without consent for mining Monero, a famous cryptocurrency.
read more