With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because of the ease of use, the threats related to Bluetooths are growing manifold. Like any other technology, Bluetooth is vulnerable to several attacks, including BlueSmacking, BlueJacking, BlueSnarfing, and BlueBugging. In this post, we will be discussing common Bluetooth Attacks in detail, but before that, let’s …
Read More »Malware Central
What is Spear Phishing: Defined, Explained, and Explored
When Linkedin and Facebook downplayed any threats from data scraping on these sites, they were right. There was no threat in it for them, but the danger was for you and me. An attacker can effortlessly weaponize this data to create a sophisticated spear-phishing attack. Read on to know what is spear phishing, and how to keep you protected. Spear …
Read More »What is Cryptojacking: Working, detection, & prevention
The future of money is digital currency Bill Gates Here is a comprehensive article about everything you need to know about cryptojacking, how it affects your security, and ways to detect and prevent your computers from being (ab)used for cryptojacking. 21st Century is the digital age. From shopping online to financial transactions, we rely on digital transactions for everything. The …
Read More »Complete guide to Botnets, and how to stay protected
It’s been close to two decades since the Internet first noticed the existence of Botnets. They not only stand the test of time but still act as one of the most powerful tools for threat actors. In this article, we bring you all the information you need to know about them. A Botnet is a network of inter-connected systems established …
Read More »All about Stalkerware: Protection, detection, and removal
Use of softwares to spy is not uncommon, but, in the last few years some of these solutions have marketed themselves as legit use softwares aka Stalkerware. These softwares are available in the form of Kids monitoring applications, spouse monitoring applications, and so on. We have conducted detailed research to get you the answers to some of the key questions …
Read More »Darkside is gone, but Who did it?
On may 14th, 2021, a message from a cybercrime forum believed to be from Darkside Admin read. A few hours ago, we lost access to the public part infrastructure namely the: Blog. Payment Server. DOS Servers. Now these servers are unavailable by SSH, the hosting panels are blocked. Hosting support, apart from information “at the request of law enforcement agencies,” …
Read More »Dridex Malware is the Most Dreaded in April 2021
Dridex malware which has been hitting news in the last decade for different reasons is back in the news again. Dridex is also known as Bugat and Cridex. Checkpoint Research in a recent report highlighted that Dridex has maintained it’s position on the top of malware list in the month of April, 2021 with a global impact to 15% of …
Read More »Hybrid Ransomware: Explained, Explored and Security Tips
This post will discuss Hybrid Ransomware and Ransomware in general and share some best practices and information around decrypting encrypted data. Ransomware is a favourite of Cybercriminals, and Ransomware attacks are on the rise. A recent cyber threat analysis by Deep Instinct observed that malware attacks increased by 358% overall in 2020, and Ransomware increased by 435% compared to 2019. …
Read More »Cyberattacks & Malware Trends for 2021
As we’re now in the 2nd quarter of 2021 and the data from Q1 of 2020 vs 2021 can be used to have a calculated prediction about what’s going to happen to Cyber realm for the rest of the year. COVID-19 hasn’t just brought along havocs the world has never seen before, not just for the physical realm that have killed more than 2.96 million lives (at the time of this blog) and incalculable socioeconomic collateral damages to the human race. But COVID-19 has much further negative impacts in the Cyber realm, some of which have not completely revealed.
Read More »