In the last article, we stressed the importance of having an Incident Response Plan in place, while over years we have also elaborated on how threat actors have been using bots as a mode of attack against their victim. In this article, we wanted... Read more
Cybersecurity in this era has taken a radical stage breaking its age-old limits of detecting threats such as worms and viruses. Earlier defense tactics were highly effective since the attacks were relatively simple. Since protection is not enoug... Read more
Earlier this week, it had been reported in the media that Israeli spyware called Pegasus was used to spy on Indian journalists and activists earlier this year. Given the surveillance was carried out by the popular messaging app Whatsapp, it has... Read more
A new easy to use Trojan has been winning the Trojan war amongst the other Trojan malware, proving to be quite popular with cybercriminals since it allows them to steal information like credit card data, passwords and even cryptocurrency in a mu... Read more
The evolving cosmos of cyber threats have yet again brewed a new ransomware threat, which has been found by researchers. This new ransomware is dubbed as Medusa locker and it’s being actively distributed across the world through methods th... Read more