web analytics
  • News and Threat Analysis,  Tools, Tricks and More

    CRYLOGGER: A TOOL THAT MADE 306 APPS CRY FOR CRYPTOGRAPHY

    The place where the 21 century humans as well as bot resides together is the Internet. Either it is social media or it is just any other application, with the advancement of Machine Learning and Artificial Intelligence, it becomes difficult to identify whether the counterpart on the other side is a human being or a programmed bot. As a result, humans exchange information with such bots that lead to privacy issues. With the increase in traffic on the internet from last decade, tech giants Google, Facebook, Whatsapp are still regularly questioned on user’s privacy. There is no doubt on the fact that these giants have answered most of the questions…

  • News and Threat Analysis

    BEWARE! YOUR TRUST ON WINDOWS DEFENDER MIGHT LET YOU DOWNLOAD MALWARE

    One of the most popular Operating systems around the internet, Microsoft Windows, is know well known among developers, security researchers, attackers to test, build and execute their strategies. The most sophisticated reason for this is that, for over 2 decades, Microsoft has billions of users from tech as well as non tech background. The company has worked well on its vulnerabilities, loopholes and provide timely updates to its users that helps them to be in sync with the internet and has protected them from greater damages. When it comes to security of windows operating system, it has a well known feature named Windows Defender. There is no doubt on the…

  • News and Threat Analysis

    OPERATION EPIC MANCHEGO- MALDOCS DELIVERING EPIC INFOSTEALERS

    At some point in our life, we all come across some leadership responsibilities. For a leader, the most important characteristics is to get himself updated with his user’s data in order to analyze and increase their efficiency. Thus, a leader has to maintain a proper database that has both integrity and authenticity. These two features of a database determine its strength and lifeline. Popular for some past years, Microsoft’s Excel Spreadsheets are one of the most common utility used by many officials and staffers in every sector. From tourism to IT industry, every organization from different industries maintain several databases. In case of large and dynamic records, there is a…

  • News and Threat Analysis

    MEET THE YOUTH MRBMINER. A TROJAN WHICH HAS ALREADY MINED MONERO FROM THOUSANDS OF SERVERS.

    If we ask today’s youth, “What they like?”, the answer will be short and damn “fame”. Every youth in today’s time has a clear goal in his/her mind that he/she has to earn fame, but they don’t know what path to choose. Some may choose ethical and some may unethical. But adults knows this fact that fame comes from experience and hard work. Therefore, it is said that “Old is Gold”. In the past, we have covered articles many articles based on trojans that mines cryptocurrency from the systems. Today, we will talk about trojans from the same family but a youth from that family. Why we said youth? As…

  • News and Threat Analysis,  Tools, Tricks and More

    VULNERABILITY IN VISA CONTACTLESS CARD TRANSACTIONS COULD ALLOW HACKERS MAKE MILLIONS WITHOUT ANY ACTION

    In last 6 months, COVID-19 has make all of us to believe on the fact that no surface is absolutely safe to touch. As a result, people had to adopt new normal in order to survive and earn living. Welcoming this new normal, we all have learnt to abide on two most important rules which are: Social distancing. Conduct contactless meetings as much as possible. Therefore, anyone who has still not adopted the new normal is considered to be of no use by the society. If we talk about new normal in context to payments and transactions, obviously cashless or plastic payments have become the priority over cash payments. From…