Etek

Join ETEK on LinkedIn for top cybersecurity insights and updates.

Why is the Health and Pharma Sector a Target for Ransomware?

The health and pharma sector has become an increasingly popular target for ransomware attacks in recent years. This is due to several factors, including the high value of sensitive medical and patient data, the critical nature of healthcare services, and the relative ease with which attackers can gain access to vulnerable systems. In recent years, […]

Critical vulnerability in windows is exploited via office documents

Based on the Microsoft Support Diagnostic Tool (MSDT), Microsoft issues vulnerability CVE-2022-30190. Microsoft Office vulnerability dubbed “Follina” is recently disclosed in attacks targeting government entities in Europe and the US. The Follina vulnerability is characterized mainly by the easy exploitability that a cybercriminal can have since they will be able to use Office documents without […]

Vulnerabilities on Cisco equipment could allow remote code execution and denials of service.

In recent days, Cisco published several security bulletins that indicate that multiple vulnerabilities have been detected in the API and management interface on Cisco Expressway and Cisco TelePresence Video Communication Server (VCS) equipment. These weaknesses allow remote attackers to have read and write permissions on application files and execute remote code on the system with […]

Security entities warn of dangerous new malware

In a joint statement from the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the UK National Cyber Security Center (NCSC) reported that the hacking group known as Sandworm is employing a dangerous new malware variant. Identified as Cyclops Blink, the creation of this new […]

New Variant – Mylobot Malware

Mylobot is a botnet malware, which infiltrates the Dark Web. It shows a high level of complexity based on evasion techniques. In terms of function, Mylobot can be used to download any payload, be it crypto mining, ransomware, banking Trojans, spyware, or other malware. STEALTH PROCESSES Anti-virtual (VM) and anti-sandbox: The malware looks for its […]

Cisco Issues Email Security Updates Due to DoS Issue

Cisco has found a high-criticality vulnerability that could allow remote attackers to crash Cisco secure email devices using maliciously crafted email messages. The vulnerability CVE-2022-20653 describes that the DNS-based named entity authentication (DANE) email verification component of the Cisco AsyncOS for Cisco Email Security Appliance (ESA) software could allow an unauthenticated remote attacker to cause […]

Microsoft Windows REGSVR32 Vulnerability

Microsoft Windows REGSVR32 Vulnerability Researchers report the detection of an increase in the use of the regsvr32.exe process through various Microsoft Office documents. According to the report, malware variants have been identified trying to execute .ocx files in a technique known as Squablydoo, malware distributors are using this technique to spread Qbot and Lokibot through […]

Main cybersecurity threats in 2022

Since the pandemic in which we find ourselves due to COVID 19, the process of digitization and adoption of new technologies in the world accelerated as never expected, forcing people and organizations to work remotely at home implied using tools that were not previously contemplated, along with this also added new attack vectors, which cybercriminals […]

Solarwinds present new vulnerability

Solarwinds software, known for its support in monitoring the availability and health of devices in many companies, is once again vulnerable in its Serv-U application unit used for file transfer. Solarwinds has been one of the most widely deployed software in companies to monitor the availability and performance of their platforms, nevertheless in the past […]

Vulnerability in Microsoft could allow attackers to take over AD

Called noPac/sAMAccountName, two vulnerabilities on the Windows operating system would allow attackers to take complete control of active directories hosted on this technology. Although the two vulnerabilities have existed since November with the following identifiers CVE-2021-42278 and CVE-2021-42287, they had gone somewhat unnoticed because no proof of concept had been developed that was effective, this […]

Apply Now