Cyber Accord
  • Home
  • Services
    • Security Testing
    • CLOUD SECURITY
    • GAP ASSESSMENTS
    • Compliance Readiness
    • Advisory
    • Questionnaires
  • About us
  • Contact
  • Our Blogs
Select Page
Exploiting Avast Anti-Rootkit Driver: How Hackers Evade Detection

Exploiting Avast Anti-Rootkit Driver: How Hackers Evade Detection

Cyber Security

A harmful scheme has been unearthed wherein the malware utilizes a more sinister strategy, dropping the authentic Avast Anti-Rootkit driver (aswArPot.sys) to avoid detection. The malicious software leverages the driver’s deep access to halt security processes,...
Disruption of Phishing Operations: Microsoft’s Takedown of 240 Domains

Disruption of Phishing Operations: Microsoft’s Takedown of 240 Domains

Cyber Security

The Cybercrime Branch (CB) of Microsoft has shut down 240 deceitful websites that were exploited by the Egyptian phishing solution “ONNX.” Abanoub Nady, known online as “MRxC0DER,” launched and promoted “DIY” phish kits under the fake alias of “ONNX”. These kits were...
Unsecured Wi-Fi Networks: Vulnerabilities Exploited by Hackers from Russia

Unsecured Wi-Fi Networks: Vulnerabilities Exploited by Hackers from Russia

Cyber Security

A hacking group sponsored by the Russian government, GruesomeLarch (also known as APT28 or Fancy Bear), has showcased an advanced new attack method named the “Nearest Neighbor Attack.” This technique enables remote hackers to infiltrate organizations by leveraging...

“The Future Landscape of Cyber Resilience: A 2025 and Beyond Perspective”

Cyber Security

  In the year 2021, a series known as “A Journey in Organizational Resilience” was conducted. The subjects covered in this series continue to hold relevance today, and in many instances, they are even more crucial now, given the swift transformations witnessed in...
Russian Cyberattack: An Examination of HATVIBE and CHERRYSPY Hacking Tools

Russian Cyberattack: An Examination of HATVIBE and CHERRYSPY Hacking Tools

Cyber Security

TAG-110, a menace group linked with Russia, is currently engaged in cyber-espionage operations targeting organizations in Central Asia, East Asia, and Europe. The primary focuses of this group include governmental bodies, NGOs, and academic establishments by deploying...
« Older Entries
Next Entries »

Recent Posts

  • “ZuRu Malware Targets macOS Users Through Compromised Termius App”
  • “Top 5 Remote Access and RMM Tools Targeted by Cyber Threat Actors”
  • Microsoft Unveils July 2025 Cumulative Update for Windows 10
  • Russia Imprisons Hacker Collaborating with Ukrainian Intelligence for Cyberattacks on Key Infrastructure
  • “Release of PoC for ‘CitrixBleed 2’ Vulnerability”

Categories

  • Cyber Security
CyberAccord | All Rights Reserved | 2025