Open-source intelligence techniques and visualization
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
Hunt the Haunt
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
As per the recent updates, the German government has decided to pass that allows German intelligence agencies to use Trojan software on its citizens without much noise in monitoring them…
Here is how Ransomware 2021 used legitimate tools to exploit the victims in ransomware campaigns. The tools were intended to be used for authorized and security researches but the ransomware…
Researchers from the Kaspersky Endpoint security firm have identified Zero-day exploit from Google’s Chrome browser and Microsoft windows zero-day exploits that have targeted multiple attacks on several enterprises. Now the…
Thanos Ransomware which targeted an attack on State-run organizations in the Middle East and North Africa on July 6 and July 9, 2020, seems to be active again as per…
A messaging app called ANOM was used by law enforcement around the world to monitor the communications of Organized crimes. The app used was an FBI-run chap messaging app which…
In today’s technology world, privacy is what everybody is concerned about how internet applications like Google, Facebook, and many internet giants misusing your data. It’s important to have antivirus software…
On May 30th, 2021, Threat Intelligence company Cyble reported a new incident to the Bombay Stock Exchange (BSE), National Stock Exchange (NSE). A research team from Cyble performed an initial…
The new Ransomware Epsilon Red was discovered Sophos malware researchers. This Ransomware is written in the Go programming language which is called Epsilon Red. The malware mainly targets the unpatched…
Business e-mail Compromise is a scam campaign hosted by the attackers to target the corporate companies by collecting the employees’ e-mail IDs from the available sources. BEC attack’s main goal…