What is Cyber Threat Hunting?
In recent years, the Term “Threat Hunting” has become the most important component of Cyber Security Programs. Most Enterprises and Cyber Professionals have started to adopt the Threat hunting terminology…
Hunt the Haunt
In recent years, the Term “Threat Hunting” has become the most important component of Cyber Security Programs. Most Enterprises and Cyber Professionals have started to adopt the Threat hunting terminology…
The Storm Botnet was a botnet that was initially identified in the year 2007. It is also known as Dorf botnet and Ecard Malware like similar botnets it was controlled…
As per the Palo Alto cyber security analyst, a recent adware campaign has been found targeting google search engine requests through malicious browser extensions. Palo’s threat intelligence claims that attackers…
Squirrelwaffle targeted vulnerable exchange servers to spread malspam through hijacked email threads as reported by the Sophos tech. As per the experts, the Squirrelwaffle is a new malware loader that…
Apple has released an IOS update for Apple devices that fixes the CVE- 2022-22620 vulnerability in the WebKit browser engine that hackers would have already exploited in a wild. And…
5Cs of Cyber Security Physical and logical Cyber security is the topmost priority for most enterprises today. The risk management plan for Cyber security is as essential as having a…
The Cyber kill chain is the term which was initially started from the military, the military term as kill chain. Here cyber kill chain model has different stages of an…
Recently security researchers have brought to a notice that an Android malware that pretends to be the legitimate ARMAAN (armaan.apk) application which would be developed by India’s govt related to…
Department of Homeland Security (DHS) initially warns potential impact of the Russian cyberattacks on US locals and Government infrastructure. It was first reported by CNN that Russia maintains a range…
The year 2022, the First ransomware attack which not many are talking about, but we will discuss the schedulefly ransomware attack, Schedulefly is an online cloud-based app that most industries…