What is Cyber Threat Hunting?
In recent years, the Term “Threat Hunting” has become the most important component of Cyber Security Programs. Most Enterprises and Cyber Professionals have started to adopt the Threat hunting terminology…
Storm Botnet and its Purpose of Cyberattacks
The Storm Botnet was a botnet that was initially identified in the year 2007. It is also known as Dorf botnet and Ecard Malware like similar botnets it was controlled…
Google Search engines targeted by recent adware campaigns
As per the Palo Alto cyber security analyst, a recent adware campaign has been found targeting google search engine requests through malicious browser extensions. Palo’s threat intelligence claims that attackers…
Microsoft Exchange server exploited by Squirrelwaffle malware
Squirrelwaffle targeted vulnerable exchange servers to spread malspam through hijacked email threads as reported by the Sophos tech. As per the experts, the Squirrelwaffle is a new malware loader that was discovered…
Apple’s IOS with critical Zero-day Webkit Vulnerability
Apple has released an IOS update for Apple devices that fixes the CVE- 2022-22620 vulnerability in the WebKit browser engine that hackers would have already exploited in a wild. And they urge…
The Underrated 5Cs of Cyber Security You Need to Know
5Cs of Cyber Security Physical and logical Cyber security is the topmost priority for most enterprises today. The risk management plan for Cyber security is as essential as having a…
The Incredible Cyber Kill Chain model we Can’t Live Without
The Cyber kill chain is the term which was initially started from the military, the military term as kill chain. Here cyber kill chain model has different stages of an…
The Ultimate Indian Army Faces Trojan Attacks from Android Malware
Recently security researchers have brought to a notice that an Android malware that pretends to be the legitimate ARMAAN (armaan.apk) application which would be developed by India’s govt related to…
The Devastating Environmental Impact of DHS Hacked by Suspected Russian Hackers
Department of Homeland Security (DHS) initially warns potential impact of the Russian cyberattacks on US locals and Government infrastructure. It was first reported by CNN that Russia maintains a range of offensive…
2022 first ransomware attack hit Schedulefly
The year 2022, the First ransomware attack which not many are talking about, but we will discuss the schedulefly ransomware attack, Schedulefly is an online cloud-based app that most industries…