New BlackCocaine Ransomware attack on Indian IT Company
On May 30th, 2021, Threat Intelligence company Cyble reported a new incident to the Bombay Stock Exchange (BSE), National Stock Exchange (NSE). A research team from Cyble performed an initial analysis…
Cybercriminals targeting Organizations with Epsilon Red Ransomware
The new Ransomware Epsilon Red was discovered Sophos malware researchers. This Ransomware is written in the Go programming language which is called Epsilon Red. The malware mainly targets the unpatched…
Business E-mail Compromise Attacks (BEC)
Business e-mail Compromise is a scam campaign hosted by the attackers to target the corporate companies by collecting the employees’ e-mail IDs from the available sources. BEC attack’s main goal…
Pyramid of pain in Threat Hunting
Pyramid of pain is an interesting and important topic of Cyber threat Intelligence and Threat Hunting. It was first introduced in 2013 by Security professional David J Bianco Its main…
Cybersecurity Incident Response life cycle
Cybersecurity Incident Response is a process of the Organization to detect, prevent and eradicate malicious incidents, threats, attacks that breach the company networks. . This is important for a security…
Difference between Firewall and Antivirus software
Most of them think that firewall and Antivirus are the same from the process and their functions. But it’s not the same both Antivirus and firewall are part of cybersecurity…
Difference between TCP and UDP Protocols
What is TCP? Transmission Control Protocol (TCP) is mostly used for internet Protocols once the connection is established. TCP/IP is used to send and receive data transmitted from the network…
Fighting Ransomware techniques for Windows Users
Ransomware is one of the dangerous threats in the digital security world in recent times. It is the most dangerous threat which is capable of encrypting the data and asking…
OSI Model Explained in Simple terms
OSI Layers – Open System Interconnection Model is a framework that describes the characteristics and communications functions of telecommunication or computing systems. OSI model became popular around the 1980s and was adopted…
Characteristics of Advanced Persistent Threat (APT)
What is Advanced Persistent Threat? APT is the term where an attack in which the intruder gains access to the network & remains undetected for a long period to mine…