Estimated reading time: 8 minutes
Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Contents Introduction Infection Chain Initial Findings Campaign 1 Looking into PDF document. Campaign 2 Looking into PDF document. Technical Analysis Campaign 1 & 2 Conclusion Seqrite Protection MITRE ATT&CK...
Estimated reading time: 3 minutes
Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Estimated reading time: 4 minutes
The continuous availability of a company’s server and protection of data stored in it is crucial for smooth operations of the business. Servers often store critical information regarding products, pricing, support, contacts, etc. which are not only essential for...