A new botnet leveraging nearly a dozen exploits of high and critical severity vulnerabilities against Windows systems to turn them into crypto mining clients and sources for distributed denial-of-service (DDoS) has been identified. Even when its... Read more
With the evolution of technology in recent times, cyber threat intelligence (CTI) has become the fastest-growing element in cybersecurity. In the years to come, spending on it is expected to rise at a rapid pace. Industries across the globe have... Read more
With threat actors increasingly choosing to publicize Ransomware-as-a-service, this week we take a look at yet another ransomware that qualifies to be in the same category. This ransomware is a sophisticated file-encrypting windows strain that i... Read more
From ensuring seamless operations while working from home to defending geopolitically used cyber exchanges, a lot has been written and shared in the last few months about cybersecurity during the COVID-19 era. Needless to deduct, these thoughts... Read more
To stay one step ahead of the security companies who have been the eternal nemesis of the threat actors from cyberspace, they chose to evolve their tactics. With a new variation to each tactic they use, they become less predictable. An exhibitio... Read more