CTM360 Blog

Latest News, Articles and Advisories from CTM360.

CTM360 Blog

Amazon S3 is one of the leading cloud storage solutions offered by Amazon and is used by companies globally to power various tasks and operations. There are

...

Password Spraying is a technique used by attackers in an attempt to gain access to the victim's account by trying passwords that users are most likely to use. Attackers in a single attempt can

...

 

All unclaimed pages that act as placeholders for locations without a managed business page are considered to be “Unofficial Facebook Business Pages".

A data breach represents an event in which an unauthorized individual steals confidential and sensitive data. Data breaches cause severe damage to numerous organizations including their

...

A watering hole attack is a type of cyber attack that spreads malware into a victim’s devices. The malware being used in these attacks either gathers the victim’s

...

Most services nowadays require signup and login procedures that are based on usernames and passwords. 

Unfortunately, single-factor authentication is not enough to protect accounts

...

Credential compromise is an ever-growing concern for organizations nowadays. The volume of exposed corporate credentials has nearly tripled between 2016 and 2017 according to a recent report,

...

A new cyber threat campaign called “Sea Turtle” has been discovered. The ongoing operation began in January 2017 and continued through the first quarter of

...

 

We have come across several recent reports from security vendors being circulated regarding the sale of bank's card data on various carding websites. There are numerous carding

...

Punycode is a special encoding scheme for internationalized domain names, which makes it possible to register domains with foreign characters. It works by

...

Nowadays, gift cards are a token of appreciation to a family, friend or co-worker. However, they prove to be troublesome when used to scam people; many people

...

Fraudsters are continuously coming up with new ways to lure targets for monetary gains or to collect personal information (like Full name, email, telephone or bank

...