Russian Military hackers using Brute force Campaign
NSA (National Security Agency), CISA (Cybersecurity and Infrastructure Security Agency), FBI, UK security agencies have released a security advisory on the malicious exploitation activities by Russian military hackers against the…
3 ways Ransomware gangs are developed to a high degree of complexity
As recently the ransomware attacks are making more profits, attackers have become more powerful on the ransomware attacks using different Tactics and techniques to evade the latest security controls that have been…
Beware of WhatsApp-Mobile App Verification code
In recent news, Police in the UK has warned the WhatsApp users to be aware of the fraudsters sending the verification code without requesting by the user to steal accounts.…
Babuk Locker Ransomware builder leaked online
Babuk Locker Ransomware builder has been leaked to the public on the internet, which will be more easily available for the threat actors of ransomware to modify and exploit a…
Netfilter malicious rootkits Signed by Microsoft
Recently malware analyst Karsten Hahn states that he has detected and analysed the file signed from Microsoft which is a rootkit called “Netfilter”. Netfilter is claimed to be official drivers from Microsoft…
Top Cybersecurity concerns by Security leaders of Organizations
Most of the top security leaders believe that their Organizations are more vulnerable to cybercrimes and all the time was right. As per the survey of the security leaders, the…
Microsoft suspects new breach from SolarWinds Hackers
Microsoft on Friday had confirmed that the Customer-services agents tools have been compromised by SolarWinds Hackers and used them to launch the attack on the customer using Microsoft own tools…
New Spyware PJobRAT targets Indian military personnel
According to recent study researchers from 360 Fiberhome labs discovered the attack that mainly targeting Indian Military personnel using new Android spyware called PJobRAT malware. The PJobRAT malware is spyware that is disguised as…
ReverseRat Trojan from Pakistan compromises Indian Power Company
As per the security researchers, a new remote access Trojan was detected from Lumen’s Black Lotus Labs which is called as ReverseRat. Upon the analysis, it is confirmed that the…
Fileless malware attacks detection and prevention
What are fileless malware attacks? In the real world, living off the land means surviving only with the available resources that you can get from nature. In the technology world,…