Storm Botnet and its Purpose of Cyberattacks
The Storm Botnet was a botnet that was initially identified in the year 2007. It is also known as Dorf botnet and Ecard Malware like similar botnets it was controlled…
Hunt the Haunt
The Storm Botnet was a botnet that was initially identified in the year 2007. It is also known as Dorf botnet and Ecard Malware like similar botnets it was controlled…
As per the Palo Alto cyber security analyst, a recent adware campaign has been found targeting google search engine requests through malicious browser extensions. Palo’s threat intelligence claims that attackers…
Squirrelwaffle targeted vulnerable exchange servers to spread malspam through hijacked email threads as reported by the Sophos tech. As per the experts, the Squirrelwaffle is a new malware loader that was discovered…
Recently security researchers have brought to a notice that an Android malware that pretends to be the legitimate ARMAAN (armaan.apk) application which would be developed by India’s govt related to…
The year 2022, the First ransomware attack which not many are talking about, but we will discuss the schedulefly ransomware attack, Schedulefly is an online cloud-based app that most industries…
In the recent reports, it is stated that major countries like Russia, India & China have adopted a new technique called “RTF Template Injection” which has made a major change…
Ransomware It is a type of malware that locks and encrypts the data on the infected computer. And then attackers will notify the infected users to pay the ransom in…
CAPTCHAs are challenges to prove the that users are humans, not a robot. But the cyber attackers are using these CAPTCHAs to their advantage to hide the malware or phishing campaigns in Google’s…
Babuk Locker Ransomware builder has been leaked to the public on the internet, which will be more easily available for the threat actors of ransomware to modify and exploit a…
Recently malware analyst Karsten Hahn states that he has detected and analysed the file signed from Microsoft which is a rootkit called “Netfilter”. Netfilter is claimed to be official drivers from Microsoft…