With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because of the ease of use, the threats related to Bluetooths are growing manifold. Like any other technology, Bluetooth is vulnerable to several attacks, including BlueSmacking, BlueJacking, BlueSnarfing, and BlueBugging. In this post, we will be …
Read More »Ramya Srinivasan
What is a Black Hat Hacker: Types of Hackers
With the rapid growth in the adoption of technology, the threats of Cyberattacks have also significantly increased. The world hacked or hacker sends chills down the spine of security professionals. In this post, we will cover what a Black Hat Hacker is and what other types of hackers are out …
Read More »Types of Email Attacks: Defined, Explained, and Explored
Emails are a critical part of everyday life and play a significant role in our professional and personal life. However, since its inception, Emails have been a primary attack vector, and attackers have utilized them for ages to exploit organizations and individuals alike. In this post, we will be covering …
Read More »What is Spear Phishing: Defined, Explained, and Explored
When Linkedin and Facebook downplayed any threats from data scraping on these sites, they were right. There was no threat in it for them, but the danger was for you and me. An attacker can effortlessly weaponize this data to create a sophisticated spear-phishing attack. Read on to know what …
Read More »How to secure Docker Containers: Tips and cheats
While Docker containers are assumed to be secure, not following the best practice can put you in the way of harm. To keep you protected, we have prepared a cheat sheet on how to secure Docker containers in your organization. Following are the best practices that you should be following …
Read More »Homomorphic Encryption: Overview, applications, & uses
What if I tell you that there is a technology that can end all your worries related to data security and privacy. Even if your data is stored in the cloud, on-premise, or with a third party, it will be safe. No privileged user or threat actors will ever be …
Read More »All about Stalkerware: Protection, detection, and removal
Use of softwares to spy is not uncommon, but, in the last few years some of these solutions have marketed themselves as legit use softwares aka Stalkerware. These softwares are available in the form of Kids monitoring applications, spouse monitoring applications, and so on. We have conducted detailed research to …
Read More »How to secure Android device in 10 easy steps
Securing your Android (or Apple) device from attackers is extremely critical especially in today's time when everything from booking an Uber to Managing your Bank and Trading accounts or CryptoWallet. However unfortunately it always takes a back seat as you are busy with other high priority tasks.
Read More »Darkside is gone, but Who did it?
On may 14th, 2021, a message from a cybercrime forum believed to be from Darkside Admin read. A few hours ago, we lost access to the public part infrastructure namely the: Blog. Payment Server. DOS Servers. Now these servers are unavailable by SSH, the hosting panels are blocked. Hosting support, …
Read More »Dridex Malware is the Most Dreaded in April 2021
Dridex malware which has been hitting news in the last decade for different reasons is back in the news again. Dridex is also known as Bugat and Cridex. Checkpoint Research in a recent report highlighted that Dridex has maintained it’s position on the top of malware list in the month …
Read More »