top of page
Rabah Moula
Sep 2, 20232 min read
It's Not Just About Malware: The Subtle Danger of Stolen User Credentials
When it comes to cybersecurity, much of the focus tends to be on sophisticated attacks like Zero-days and advanced persistent threats...
0 views0 comments
Rabah Moula
Aug 24, 20232 min read
Tornado Cash: The Cyclone of Crypto Controversy
The cryptocurrency landscape is riddled with excitement, innovation, and sometimes, a darker edge. This week, a whirlwind named Tornado...
2 views0 comments
Rabah Moula
Aug 24, 20232 min read
The Hidden Dangers of Public Wi-Fi: A Deep Dive
In today's hyper-connected age, the ability to log onto public Wi-Fi from anywhere is a modern convenience many of us can't imagine...
0 views0 comments
Rabah Moula
Aug 17, 20232 min read
A Quantum Leap in Security: Google’s New Quantum-Resilient FIDO2 Key
In an increasingly connected world, where cyber threats are growing more sophisticated, Google has taken a significant step forward in...
2 views0 comments
Rabah Moula
Aug 14, 20232 min read
The SystemBC Malware Strikes Again: Southern African Power Company Under Siege
In the digital age, cyber threats have become as potent as traditional warfare. Recent developments highlight a new variant of the...
1 view0 comments
Rabah Moula
Aug 10, 20233 min read
Statc Stealer Malware: A Silent Predator Lurking in Your Windows Device
In an era where our virtual lives mirror, and at times, eclipse our physical realities, the security of our digital data becomes...
1 view0 comments
Rabah Moula
Aug 8, 20232 min read
Phishers Turn to Zero-Day Salesforce Vulnerability to Hoodwink Facebook Users
In the constantly evolving landscape of cybersecurity, innovative attackers often find new and intricate ways to exploit system...
3 views0 comments
Rabah Moula
Aug 4, 20232 min read
Sneaky Versioning: How Malicious Apps Bypass Google Play Store Scanners
The Android ecosystem is no stranger to threats. As one of the most prevalent operating systems globally, Android devices are prime...
1 view0 comments
Rabah Moula
Jul 31, 20232 min read
Fruity Trojan: Unmasking the Wolf in Sheep's Clothing
The world of cybersecurity continues to grapple with ever-evolving threats. The latest to hit the radar is a deceptive software...
2 views0 comments
Rabah Moula
Jul 28, 20232 min read
Decoding the Nitrogen Malvertising Campaign: A Closer Look at Cybersecurity Threats in 2023
With the constant evolution of cyber threats, it's no surprise that threat actors are utilizing popular search engines to distribute...
2 views0 comments
Rabah Moula
Jul 26, 20232 min read
Unravelling the Menace of FraudGPT
It's no secret that advancements in technology, while spectacularly beneficial, can also open up a Pandora's box of unanticipated...
1 view0 comments
Rabah Moula
Jul 25, 20232 min read
Cracking Open the OpenSSH Vulnerability: A Comprehensive Analysis
Open SSH - the popular network security tool used extensively in the cybersecurity world, is under the microscope once more. The newly...
1 view0 comments
Rabah Moula
Jul 21, 20232 min read
Local Governments & Ransomware: Lessons from Oakland's Cybersecurity Breach
Just as the sunrise ushers in a new day, the world of cybersecurity ushers in new threats daily. Local governments, essential to most...
0 views0 comments
Rabah Moula
Jul 17, 20232 min read
Unmasking LokiBot: A Deep Dive into Cybercrime's Recent Exploits of Microsoft Word Vulnerabilities
In the ever-evolving landscape of cybersecurity, cybercriminals continue to harness the power of well-known platforms to launch...
0 views0 comments
Rabah Moula
Jul 15, 20232 min read
WormGPT: How Cybercriminals are Weaponizing AI to Launch Sophisticated Cyber Attacks
In the ever-evolving landscape of artificial intelligence (AI), not all advancements are being used for the greater good. Cybercriminals...
0 views0 comments
Rabah Moula
Jul 14, 20232 min read
Unmasking the SOHO Router Botnet Infiltrating 70,000 Devices Worldwide
SOHO (Small Office/Home Office) routers, the silent gatekeepers of your digital domain, are not as safe as you might think. A new,...
2 views0 comments
Rabah Moula
Jul 12, 20232 min read
The Rise of the Microsoft-Signed Rootkit: A New Cybersecurity Threat
In recent months, cybersecurity analysts have unearthed a new, nefarious type of malware targeting the gaming sector: a Microsoft-signed...
2 views0 comments
Rabah Moula
Jul 10, 20232 min read
The New TOITOIN Threat: A Banking Trojan Menace in Latin America
If you're a business in Latin America, a new cyber threat may be trying to slither into your infrastructure. Operating in the shadowy...
2 views0 comments
Rabah Moula
Jun 29, 20232 min read
AI in Action: The Unseen Cybersecurity Risks
In our rapidly advancing technological landscape, one can't help but marvel at the strides we've made. From smartphones to self-driving...
2 views0 comments
Rabah Moula
Jun 27, 20232 min read
Harnessing Trust: How a Flaw in Microsoft Teams Can Open Doors to Malware
In today's hyper-connected world, cybersecurity is a paramount concern. It's a game of cat and mouse, where the roles of the predator and...
2 views0 comments
bottom of page