Various cryptocurrencies have been launched in recent years with the aim to enhance privacy and anonymity, although their success has been varied. One such cryptocurrency is Monero, which has achieved a high level of popularity and acceptance fo... Read more
Rapid change has been a perpetual constant, even when it comes to the threat landscape. The High stakes ransomware game is not like it used to be. These are no longer indiscriminate ransomware attacks. This new generation of threat actors are mo... Read more
With the evolution of technology, users find themselves with a lot of computing power at their fingertips in the form of a smartphone. Due to this, we have seen a clear shift in the lives of people as they have transformed digitally in every way... Read more
The year 2020 has provided ample opportunities for cybercriminals to make merry. In what is believed to be the largest DDoS (Distributed Denial of Service) ever, certain websites hosted by a larger service provider were targeted by cybercriminal... Read more
From the myriad of malware that we have researched, understood, and shared about this malware uses a different route to prey on its victims. The Clipper malware is famous for replacing the user’s cryptocurrency wallet with the hacker’s own... Read more