web analytics
  • News and Threat Analysis

    FAME OF SAMSUNG IN THE NAME OF ADOBE AND OXFORD

    The phishing attacks are the most widely spread attacks all over the world today. But we all must take precautionary steps in order to escape from phishing attacks. Some preventive measures include: Not clicking on links from untrusted sources Surfing the internet from a secure network Not telling our credentials to anyone But what if all the above mentioned precautions got compromised? This has been caught by researchers from Chekpoint. In the recent times, checkpoint researched a malicious campaign in which the bad actor uses the name and fame of Samsung,Oxford,Adobe to exploit the trust of the end user. In this phishing campaign the bad actor uses a redirected link…

  • Let Us Learn,  Tools, Tricks and More

    WAYS TO SPEED UP WINDOWS 10

    Apart from being the 10th version of “MICROSOFT WINDOWS”, being user friendly and having better GUI as compared to its previous versions ,WINDOWS 10 is considered to be the slowest version of Microsoft Windows. There are many reasons behind this . It may not be compatible with your laptop ( hardware requirements such as RAM , processor , hard disk may not be met properly) . be simultaneously running many tasks in the background that you may not know . be automatically updating its services or applications in the background . have corrupted windows file in it . Due to these factors, professionals do not recommend to use Windows 10…

  • News and Threat Analysis

    MICROSOFT UNCOVERS THE MALICIOUS DUDEAR CAMPAIGNS

    Nearly 6 months ago, tech giant Microsoft once again uncovered the techniques used by malicious CHIMBORAZO group to deliver info-stealer in the victim’s machine. On January 31, Microsoft tweeted that Dudear which is one of the biggest malware campaign is delivering info-stealing trojan Gracewire by attaching HTML redirectors in the email delivered to victims. These Evil Corps attached a downloadable Excel file attaching a malicious macro that drop the actual payload Gracewire trojan into the victim’s system. Following this group since January, in the 18 June, Microsoft again announced a new technique by this group delivering the same trojan into the victim’s system. This Dudear campaign is being run by…

  • Let Us Learn,  Tools, Tricks and More

    MSFVENOM: CREATE YOUR OWN PAYLOAD

    Let’s generate our own payload ! In a previous article , we discussed about the pentesting tool msfconsole and how we can use it to exploit the vulnerability and gain access on our target’s machine . In this article, we will talk about about the tool msfvenom (preinstalled in Kali Linux) which comprises of another two tools namely msfpayload and msfencoder. In our article about meterpreter, we talked about how payload is important to make a attack functionable and get most out of the attacked machine. The msfvenom does the same thing! It generates a payload according to the platform selected by you and let you access the target’s device…

  • Let Us Learn,  Tools, Tricks and More

    HOMOGRAPH ATTACK-THE MOST DANGEROUS PHISHING ATTACK

    In the past few years ,there has been a significant increase in the cyber crime across the world. New attacks make the innocent users fall in a trap of fraud. Some attacks like social engineering, have also let even non-tech savvy to attack targets. One of the application of social engineering attack is Phishing. Some years ago, attackers found a new technique of doing Phishing, known as Homograph Attack. This attack can also be known as the Advanced Phishing. But why are we calling this attack as the advanced version of phishing attack? Because this attack is that much difficult to detect that normal person who just surfs internet can not…