Google, the giant of giants, one of the child of Alphabet Inc., everybody knows that it empowers the internet today. Google has almost tried to replace the manpower with automation and is a great contributor towards technologies like Artificial Intelligence and Machine Learning. Its one of the most world widely used product, Chrome browser, account for more than 70% of the web browsers market share. The simple reason behind this big share is that either the person is a tech enthusiast or just a layman user, Google takes care for everyone. Every tech aspirant who gets into the IT industry, atleast tries once to make it to the Google. Google,…
-
-
DURI CAMPAIGNERS ARE USING HTML SMUGGLING ATTACK TO DELIVER MALWARE
To talk with computer, you need to talk in its language. Computers can’t understand your mother tongue and thus we have to understand it to use it for our tasks. There were many computer scientists who devoted all their life to understand computers, many even died exploring computer, but the computer technology is the only thing which is getting advanced day by day. As it is going advanced, the security infrastructure of technology is getting more complex to handle because there are many experts available but not every expert is working for welfare. There are still many experts who are under the hood and are regularly working to exploit your…
-
THREAT ACTORS ARE USING OBFUSCATED PHISHING CAMPAIGNS TO DELIVER MALWARE
If you are an ethical hacker trainer or have done a some kind of certifications in ethical hacking, you know how simple is to do phishing. Stronger is your social engineering knowledge, the more sophisticated phishing attacks you can launch. There are lots of tools available in the market which can help you set up your own phishing campaigns and spread your reign. Security researchers in tech giants like Google, Microsoft and AV companies work day and night to detect new phishing campaigns run by these malware operators and thus immediately update their databases to protect common unaware people about those campaigns. There is an always race among researchers and…
-
THE TRANSPARENT BLOCKCHAIN: CATCHING CYBERCRIMINALS FROM THEIR ANONYMOUS WORLD
We all know that cryptocurrencies are the only way to do anonymous transaction. Either it is FBI or NIA, they find it impossible to track the record of transaction made through cryptocurrency. Every technology geek in today’s time have tried to understand the concept of cryptocurrency due to its growing popularity. In many countries, the cryptocurrency is banned but still it a trending currency in the cyber criminal underground world. But do you wonder what makes it trending in the underground? Well the answer for this question is straightforward. As said above, the cryptocurrency provides a way to cyber criminals to make their transactions absolutely anonymous. What this means is…
-
ONE RANSOMWARE, TWO FAMILIES
Every organization, corporate or company invest a large amount of their revenue in protecting network infrastructure from cyber attacks. Though cyber criminals sometimes have strategical target, they can unconditionally attack any organization . For the organizations which got attacked, it becomes very difficult to recover data and revenue which it lost while recovering from attacks. The most damaging tool for cyber criminal is to infect the victim’s computer with a ransomware. The simple reason behind this is the hard encryption which is almost impossible to decrypt. But some security experts with much experience and exceptional knowledge are able to do so. These ransomware operators generally encrypt the victim’s file using…