Get a Pentest and security assessment of your IT network.

Cyber Security

RevengeRAT Distributed via Bit.ly, BlogSpot, and Pastebin C2 Infrastructure

A malicious campaign targeting entities from North America, Europe, Asia, and the Middle East during March used a combination of pages hosted on Bit.ly, BlogSpot, and Pastebin to create a command-and-control (C2) infrastructure. Palo Alto Networks’ Unit 42 discovered that the threat actors behind the campaign dubbed “Aggah”” employed the C2 infrastructure built using only legitimate services to drop RevengeRAT payloads on organizations from “”Technology

Source: Hospitality

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security