In the period of time between January and May 2021, Ransomware has done nothing but confirmed itself as the primary threat in the global IT security landscape. The spike in infections and strains that had begun to appear around the end of 2019, has only increased with a consequent evolution of TTPs (Tactics, Techniques, and
LinkedIn data scraping – “Over 1Billion LinkedIn data available”, over “520 million email addresses and phone numbers of LinkedIn users” – are just some of the “announcements” Swascan‘s SOC as a Service and Cyber Threat Intelligence Teams first identified on April 5th, 2021 via its Security Testing and Threat Intelligence platform, as noted in the
BitLocker Ransomware – analysis by Fabrizio Rendina, Riccardo Paglia and the Soc As a Service Team Swascan Common antivirus software currently manages to intercept almost all ransomware in circulation. But what happens when the ransomware actually exploits a Windows feature? We are talking about BitLocker, an add-on already installed in common operating systems which, if used
VenomRAT – Malware analysis Venomrat Malware. – The Swascan Cyber Research Team has tracked and analysed a RAT called VenomRat. The malware in question is named Venom Software or VenomRAT, a remote access Trojan (RAT) currently on sale on various forums on the darkweb but also available on websites accessible via a simple Google search.
Smishing Attack Simulation – The word Smishing comes from the union of Phishing and SMS. This is simply the classic online Cyber Attack vector translated on a mobile platform, as the name suggests. If in the case of traditional Phishing Criminal Hackers use fraudulent e-mails – relying on a number of tricks of the trade
By: Pierguido Iezzi, Riccardo Paglia and Jim Koohyar Biniyaz In the last two weeks companies have reported a number of attacks by a new Ransomware strain called “Pay2Key”. Pay2Key has been developed in C++ programming language and threat actors weaponized its first iteration in October 2020. The Swascan Cyber Security Research Team has been one
Another success for the Swascan Cyber Research Team, which adds to the long list of Vulnerability Disclosure and collaborations already successfully completed in less than 12 months: Swascan has been officially included in the CERT-EU Hall of Fame. Speaking about the recognition – particularly in such a complex moment -, Pierguido Iezzi, Co-Founder of Swascan
Domain Threat Intelligence – Digital tech it’s at the core of every industry nowadays. Automation and interconnection between machines are the pillars at the center of the current economic revolution, but at the same time this Paradigm shift and the subsequent expansion of the digital perimeter has increased several times the risk of Cyber Attacks.
ECSO Cyber Security Market Radar 2019 – Another award for Swascan, testament to the real word value of all its Cyber Security solutions. The company, which specializes in IT security solutions, has in fact placed itself at the center of all 4 “radars” of the ECSO Cyber Security Market Radar 2019 where its services are
Another success for Swascan’s Cyber Security Resarch Team. After the accomplishments gained with Adobe, Microsoft, Lenovo,Huawei and Nokia it was SAP’s turn, the leading global ERP software provider, to end up under the watchful eye of Swascan’s magnifying glass. The analysis result yielded several vulnerabilities of critical level related to SAP’s IT infrastructure. Swascan, the Italian
Swascan, the Cyber Security Firm that thanks to its Research Team had already been able to unravel the vulnerabilities of Adobe, Microsoft and Lenovo recently brought to light some critical issues of Huawei’s web applications and servers, the giant specialized in the production of systems and solutions for networks and telecommunications. Swascan, the Italian Cyber Security company