Process Ghosting – New Malware evasion attack technique
Cybersecurity researchers have discovered a new malware evasion technique called “Process Ghosting” with a new executable image tampering attack which could be potentially abused by the hackers in the windows…
What is Evasion Technique and its classification?
Introduction: Evasion technique is where the malwares can bypass the security control devices without even getting detected by them and executes the successful exploitation on the targeted victims. The term…
Samsung phones to spy on users
Security researchers analyzed the Samsung smartphones and found multiple critical vulnerabilities that can be exploited by the hackers using Pre-installed applications. As per the researchers, the vulnerabilities could exploit the…
Open-source intelligence techniques and visualization
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
German government using a Trojan software to Spy their citizens
As per the recent updates, the German government has decided to pass that allows German intelligence agencies to use Trojan software on its citizens without much noise in monitoring them…
Ransomware 2021 weaponized by Legitimate tools
Here is how Ransomware 2021 used legitimate tools to exploit the victims in ransomware campaigns. The tools were intended to be used for authorized and security researches but the ransomware…
PuzzleMaker attack Google chrome zero-day exploit
Researchers from the Kaspersky Endpoint security firm have identified Zero-day exploit from Google’s Chrome browser and Microsoft windows zero-day exploits that have targeted multiple attacks on several enterprises. Now the…
New Ransomware gang Claiming to be Thanos Ransomware
Thanos Ransomware which targeted an attack on State-run organizations in the Middle East and North Africa on July 6 and July 9, 2020, seems to be active again as per…
800 Criminals arrested with FBI-Chat app tricks
A messaging app called ANOM was used by law enforcement around the world to monitor the communications of Organized crimes. The app used was an FBI-run chap messaging app which…
How to block your ISP from tracking your browsing data?
In today’s technology world, privacy is what everybody is concerned about how internet applications like Google, Facebook, and many internet giants misusing your data. It’s important to have antivirus software…