[email protected] +603-2181 3666
Extol Threat Intelligent Notification

You can’t seem to outrun them. They are seem to strike when least expected. They are growing by the day and you wish they would stop. But no, they continue to haunt you and strike fear in you. And they continue to grow in numbers very rapidly. Malware – known and unknown – are plaguing […]

IT News

Fred’s Inc., a discount general merchandise and pharmacy chain that operates 650 stores in more than a dozen states, disclosed today that it is investigating a potential credit card breach. KrebsOnSecurity contacted Fred’s earlier this week, after hearing from multiple financial institutions about a pattern of fraud on customer cards indicating that Fred’s was the […]

How to act after a cyber-attack
June 11, 2015

We hear it every day, experts are always talking about it: preventing cyber-attacks is very complicated, almost impossible, so what organizations should do is work on perfecting the process to follow, once they have suffered an attack, in order to regain control as soon as possible, disinfect computers, assess damage and take the appropriate actions. […]

IT News
Patch Update
June 11, 2015

Adobe has released security updates to fix 13 security holes in Flash Player, while Microsoft has fixes for at least three dozen flaws in Windows and associated software. 23 flaws that Microsoft fixes reside in Internet Explorer browser. Aside from this it also patches serious problems in Office, Windows O/S and Windows Media Player.   […]

IT News

Missing Link Networks Inc., a credit card processor and point-of-sale vendor that serves a number of wineries in Northern California and elsewhere, disclosed today that a breach of its networks exposed card data for transactions it processed in the month of April 2015. Earlier this week, I heard from a source at one of Sonoma, […]

Duqu 2.0: Frequently Asked QuestionsDuqu 2.0 Technical Paper (PDF)Indicators of Compromise (IOC)Yara rulesPress release Earlier this year, during a security sweep, Kaspersky Lab detected a cyber-intrusion affecting several of our internal systems. Following this finding, we launched a large scale investigation, which led to the discovery of a new malware platform from one of the […]