Ransomware Gangs Now Calling And Emailing VictimsIt seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming... BLOG UK Police Trying to Stop Worrying Increase of Child Hackers February 4, 2022 UK police are investigating and deploying possible solutions to a concerning trend of an increasing number of young individuals showing... Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful... The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Award winning game studio hit by ransomware and threatened to get data leaked March 5, 2021 In early February, CD Projekt Red, the game studio behind popular games like The Witcher series, and Cyberpunk 2077 got... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
Ransomware Gangs Now Calling And Emailing VictimsIt seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming...
BLOG UK Police Trying to Stop Worrying Increase of Child Hackers February 4, 2022 UK police are investigating and deploying possible solutions to a concerning trend of an increasing number of young individuals showing... Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful... The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Award winning game studio hit by ransomware and threatened to get data leaked March 5, 2021 In early February, CD Projekt Red, the game studio behind popular games like The Witcher series, and Cyberpunk 2077 got... Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with... Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
UK Police Trying to Stop Worrying Increase of Child Hackers February 4, 2022 UK police are investigating and deploying possible solutions to a concerning trend of an increasing number of young individuals showing...
Quick Look at New TrickBot Affiliates December 14, 2021 The TrickBot gang, responsible for creating BazarLoader, the Conti ransomware, and the infamous TrickBot trojan, has become even more powerful...
The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow....
Award winning game studio hit by ransomware and threatened to get data leaked March 5, 2021 In early February, CD Projekt Red, the game studio behind popular games like The Witcher series, and Cyberpunk 2077 got...
Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming...
Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement...
OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...
How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known...
Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...