CTM360 Blog

Latest News, Articles and Advisories from CTM360.

CTM360 Blog

Password Spraying is a technique used by attackers in an attempt to gain access to the victim's account by trying passwords that users are most likely to use. Attackers in a single attempt can

...

 

All unclaimed pages that act as placeholders for locations without a managed business page are considered to be “Unofficial Facebook Business Pages".

A data breach represents an event in which an unauthorized individual steals confidential and sensitive data. Data breaches cause severe damage to numerous organizations including their

...

A watering hole attack is a type of cyber attack that spreads malware into a victim’s devices. The malware being used in these attacks either gathers the victim’s

...

Most services nowadays require signup and login procedures that are based on usernames and passwords. 

Unfortunately, single-factor authentication is not enough to protect accounts

...

Credential compromise is an ever-growing concern for organizations nowadays. The volume of exposed corporate credentials has nearly tripled between 2016 and 2017 according to a recent report,

...

 

We have come across several recent reports from security vendors being circulated regarding the sale of bank's card data on various carding websites. There are numerous carding

...

Punycode is a special encoding scheme for internationalized domain names, which makes it possible to register domains with foreign characters. It works by

...

Nowadays, gift cards are a token of appreciation to a family, friend or co-worker. However, they prove to be troublesome when used to scam people; many people

...

Binary Trading (commonly also known as Binary Options Trading or Binary Options) is a type of option where the trader takes a yes or no position on the price of a

...

 

Subsequent to our advisory on the cache of tools leaked from the NSA by the group ShadowBrokers, a cybercriminal group has incorporated one of the

...

A prominent hacking group has allegedly leaked documents and tools from 2013 belonging to the NSA. This cache of data contains a targeted list of at least 29

...