The technical details of QakBot, a decade-old banking Trojan, were uncovered in a detailed analytical report by a security firm. It has been active since 2007, and it has continued to claim victims while evolving at the same time. Analysis of th... Read more
The Pysa ransomware operation’s PowerShell script gives us a sneak peek at the types of data they try to collect during a campaign. When ransomware gangs infiltrate a network, they usually start with a single device that they have restrict... Read more
Using previously published ProxyShell vulnerability exploits, the Conti ransomware group is hacking into Microsoft Exchange servers and compromising corporate networks. ProxyShell is a name for an exploit that uses three chained Microsoft Exchan... Read more
As a result of the lockdown, people have been forced to stay indoors and discover new methods to be occupied, hence, the video game industry is at an all-time high. Despite the fact that things are again returning to normal, the gaming sector is... Read more
In the field of cybersecurity, cybercrime services have become a concerning outgrowth. As tech-savvy hackers have established complete business models for a profitable revenue stream, investment in Cybercrime-as-a-Service (CaaS) is skyrocketing.... Read more