Skip to main content

BLOGS

DATA BREACH RESOURCES

Infiltration into the INC Ransomware Group’s Infrastructure

| Data Breach Resources | No Comments
In a world where technology news are dominated by stories of ransomware attacks and data breaches, Cyber Centaurs is proud to share a rare story of success. While many organizations…

RedNovember’s Tactics and Tradecraft

| Data Breach Resources | No Comments
Over the past year, a Chinese-linked threat actor known as RedNovember has emerged as a significant player in the global cyber-espionage landscape. Their operations have targeted governments, defense contractors, law…

Threat Actors’ Obsession with Veeam Backups

| Data Breach Resources | No Comments
Threat actors are now deliberately targeting Veeam backup infrastructure to exfiltrate sensitive data before executing broader attacks. For years, Veeam Backup & Replication has quietly supported business continuity across enterprises…

DIGITAL FORENSICS RESOURCES

The Truth About Deleted Data and Modern Technology

| Digital Forensics Resources | No Comments
Across the field of digital forensics, one myth persists with remarkable tenacity: the belief that deleted data is never really gone. This notion, popularized by crime dramas and media portrayals,…

Detecting Deepfakes in Legal Cases

| Digital Forensics Resources | No Comments
Why Deepfakes Matter to Lawyers In the rapidly evolving digital landscape, few technologies pose as significant a challenge to legal professionals as deepfakes. These AI-generated videos, images, or audio files…

THREAT ACTOR DOSSIER

FOG Threat Actor Dossier

| Threat Actor Dossier | No Comments
The FOG threat actor group, first identified by Arctic Wolf researchers on May 2, 2024, represents a distinctive strain within the larger ecosystem of ransomware operations. While sharing similarities with…

PENETRATION TESTING

Understanding Remote Access Trojans (RATs)

| Penetration Testing | No Comments
Understanding RATs In the dynamic landscape of cybersecurity, the Remote Access Trojan (RAT) emerges as an enduring and sophisticated menace. Functioning as a specialized form of malware, RATs excel in…

Using Penetration Testing to Stop a New Stealth Breed of Ransomware Attacks

| Penetration Testing | No Comments
Ransomware is arguably one of the most insidious and damaging forms of malware. Cybercriminals are continually exploiting newer methods to circumvent strategies by enterprises to thwart ransomware attacks. A recent…

LEGAL ANALYSIS