[email protected] +603-2181 3666
Extol Threat Intelligent Notification
IT News
Exploits: how great is the threat?
April 20, 2017

How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Several zero-days, as well as a bunch of merely ‘severe’ exploits apparently used in-the-wild were disclosed, and it is not yet clear whether this represents […]

IT News
Online Privacy Bill Myths Debunked
April 19, 2017

Is your Online Privacy safe? Over the last few weeks, there have been numerous articles from tier one media outlets, claiming the acceptance of the privacy bill will completely remove every bit of online confidentiality away from US internet users. The news made global headlines at the end of March, and it has been a […]

IT News

  As more and more pieces of our environment get connected to the Internet, the number of potential targets of a cyberattack becomes staggering, and the possible consequences become increasingly worrisome. Take what happened recently in Dallas, TX, where most of the city’s population was woken up in the middle of the night to the […]

IT News
Personalized Spam and Phishing
April 19, 2017

Most spam, especially the sort that is mass-mailed on behalf of businesses, has quite an impersonal format: spammers create a message template for a specific mailing purpose and often drastically diversify the contents of that template. Generally, these kinds of messages do not personally address the recipient and are limited to common phrases such as […]

IT News

National elections have become a global stage for hackers to display their virtuosity, bringing the question of cybersecurity to the forefront of the conversation. Since Barack Obama accused the Russians of meddling in 2016’s presidential election in favor of Donald Trump, several European countries have taken their own measures to avoid such cyberattacks. Recently, the vulnerability of […]

IT News

We’re all familiar with the massive data leaks that Yahoo suffered last year. But until recently, we had very little in the way of clues as to who was behind the attacks which started at the beginning of 2014. As more evidence comes to light, it’s becoming increasingly apparent that this is not your run-of-the-mill […]

IT News

Why should you update your Android device’s operating system? Two words. Ghost Push. The well known trojan has had various iterations and it’s often updated to bypass new security updates. At its peak, Ghost Push infected over 600,000 Android devices daily, a colossal number. The trojan is capable of rooting phones, displaying revenue-generating ads that […]

IT News
Unraveling the Lamberts Toolkit
April 11, 2017

Yesterday, our colleagues from Symantec published their analysis of Longhorn, an advanced threat actor that can be easily compared with Regin, ProjectSauron, Equation or Duqu2 in terms of its complexity. Longhorn, which we internally refer to as “The Lamberts”, first came to the attention of the ITSec community in 2014, when our colleagues from FireEye […]

1 31 32 33 34 35 157