Ransomware Incident Response Plan
Ransomware It is a type of malware that locks and encrypts the data on the infected computer. And then attackers will notify the infected users to pay the ransom in…
How to Start a for successful threat Hunting for beginners?
What is Threat Hunting? Threat Hunting is a proactive approach to find the patterns of the existing malware in our network. As it’s a focused way to find the security…
CAPTCHAs used to Escape detection by attackers
CAPTCHAs are challenges to prove the that users are humans, not a robot. But the cyber attackers are using these CAPTCHAs to their advantage to hide the malware or phishing campaigns in Google’s…
Credit cards data leaked over 1 million in Cybercrime forum- 2021
During the recent searches from Cybercrime forums, security researchers from D3Lab team has found that popular cybercrime market author AllWorld.Cards has leaked over 1million credit cards details for free from…
How to manage your Privacy on Google monitoring
Today users are more concerned about the online privacy from which google thrives on your information and uses to attract more advertisers who can use all the available data and…
EU PARLIAMENT APPROVES MASS SURVEILLANCE OF PRIVATE COMMUNICATIONS
On 6th July 2021, European Parliament has approved the Eprivacy Derogation, which is allowing to monitor the email and messaging services of each citizen to check and report the suspected…
Kaseya VSA Ransomware attack detailed analysis
REvil ransomware targeted Kaseya, an IT solutions developer for MSP’s and enterprise clients which has recently became an victim of Cyberattack on July 02, 2021 on American Independence Weekend. Kaseya…
Russian Military hackers using Brute force Campaign
NSA (National Security Agency), CISA (Cybersecurity and Infrastructure Security Agency), FBI, UK security agencies have released a security advisory on the malicious exploitation activities by Russian military hackers against the…
3 ways Ransomware gangs are developed to a high degree of complexity
As recently the ransomware attacks are making more profits, attackers have become more powerful on the ransomware attacks using different Tactics and techniques to evade the latest security controls that have been…
Beware of WhatsApp-Mobile App Verification code
In recent news, Police in the UK has warned the WhatsApp users to be aware of the fraudsters sending the verification code without requesting by the user to steal accounts.…