A new variant of Locky Ransomware has been discovered and has been spreading through a Spam Campaign with the Subject Line “Status of Invoice”. Moreover, the attachments are compressed using... Read more
New variants of Locky Ransomware are rising: To proliferate ransomware, cyber criminals often employ spam emails (infectious attachments), unofficial software download sources, trojans, and... Read more
Petya Ransomware also known as Petrwrap or GoldenEye affects Microsoft Windows based systems and encrypts the data MBR / NTFS in the system using SMB exploits which are not updated with the... Read more
Till recent times, email harvesting was a time consuming process and was never real-time. This constituted, making connections to the smtp server and providing a dictionary to carry out the... Read more
Before we jump on to the topic of phishing attacks, let us understand the two important aspects that govern the success or failure of these types of attacks. 1. Sender Policy Framework (SPF)... Read more