Ubuntu Released Security Updates & Fixed Multiple Critical Vulnerabilities

Haythem Elmir

Ubuntu Released security updates frequently this month and fixed multiple critical vulnerabilities that affected the Ubuntu package. The vulnerabilities are fixed with the latest packages if you have enabled automatic update in your Ubuntu servers the updates will be applied automatically. php5 vulnerabilities Ubuntu fixes the several vulnerabilities that affected the PHP that provides  corresponding […]

Hackers stole $60 Million worth of cryptocurrencies from Japanese Zaif exchange

Haythem Elmir

Cybercriminals have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies from the Japanese digital currency exchange Zaif exchange. According to the Tech Bureau Corp., a Japanese cryptocurrency firm, hackers have compromised its Zaif exchange and have stolen 6.7 billion yen ($60 million) worth of cryptocurrencies, including Bitcoin, Monacoin, and Bitcoin […]

3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web Marketplace

Haythem Elmir

Cybercriminals listed 3000 Hacked websites access for sale in Russian based underground marketplace that sells for less than $50. The underground marketplace is the best area for criminals where they can sell and buy various maliciou software and stolen data for a very cheapest price. This hacked website selling in Russian-speaking underground marketplace called MagBo where the advertisement […]

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

Haythem Elmir

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities such as DDOS Attacks or through security policy violations. An IDS works by monitoring system activity through examining vulnerabilities in the system, the integrity of […]

Sustes Malware: CPU for Monero

Haythem Elmir

Sustes Malware doesn’t infect victims by itself, but it is spread via brute-force activities with special focus on IoT and Linux servers. Today I’d like to share a simple analysis based on a fascinating threat that I like to call Sustes (you will see name genesis in a bit). Everybody knows Monero […]