Resources

Welcome to our Cyber Hub! Explore the latest security updates, case studies, and upcoming events

Tails from the shadow

APT 41 Injecting ShadowPad with Sideloading

The HackersEye DFIR team's investigation into an APT41 attack uncovered the group's expertise in leveraging sophisticated tactics to target enterprise environments. The campaign began with a compromised VPN appliance, which enabled initial access, followed by lateral movement using RDP. The early indicators of compromise were only subtle traces, such as unusual DNS activity from spoolsv.exe.

Israeli National Cyber Directorate Training

Israeli National Cyber Directorate Training

HackersEye Leads Training with Israeli National Cyber Directorate

LOG4J exploit shocks cyber security

LOG4J exploit shocks cyber security

Explore how NSO’s Pegasus spyware exploited iOS vulnerabilities through sophisticated tactics, reshaping the cybersecurity landscape by making advanced hacking tools available to private entities.

Iranian Hackers Claim Breach on Intel Israel

Iranian Hackers Claim Breach on Intel Israel

Iranian hacking group Pay2Key launches a ransomware attack on Intel Israel, threatening to expose sensitive data from its AI processor chip subsidiary, Habana Labs, unless demands are met.

Tails from the shadow

Tails from the shadow

This article reveals APT41’s cyber operations using Logger.exe to deploy ShadowPad malware through DLL sideloading. Discover how this group evades detection, leverages sophisticated attack methods, and what strategies can mitigate this advanced threat.

MuddyWater’s Cyber Assaults on Israel

MuddyWater’s Cyber Assaults on Israel

Implemented advanced EDR solutions, enforced multi-factor authentication, and conducted comprehensive employee training to protect a mid-sized healthcare provider from ransomware attacks, resulting in zero breaches and enhanced compliance.

CheckMesh: Hidden Threats in Your FW

CheckMesh: Hidden Threats in Your FW

CheckMesh attack: APTs turning Check Point firewalls into Command & Control nodes. Learn how we uncovered and mitigated this threat.

24/7

Click here for an immediate response over WhatsApp!