web analytics
  • News and Threat Analysis

    1.5 MILLION SPAM CALLS RECEIVED TO 66,606 NUMBERS WHICH ARE NOT KNOWN BY ANYONE

    In our mailing system, we have a category of spam in which our client automatically filters a mail in which it finds the sender’s email address to be blacklisted by us or it is globally set as spam in its database. Tech giants like Google, Microsoft are really working for years to identify the spam messages . Many believe that scammers and spammers have the same meaning but in actual there is a difference as well as a similarity between them. People belonging to both groups will send scam emails that are unwanted for you but scammers will send you messages that are really harmful for you and can overtake…

  • News and Threat Analysis

    TELLYOUTHEPASS RANSOMWARE OPERATORS ARE TAKING THE LEGACY OF WANNACRY RANSOMWARE FORWARD

    The most dreadful events of all times in the history of ransomware attacks that actually make youths aware of the fact what actually ransomware is and what amount of damage it cause is the WannaCry ransomware. This attack took place around three years ago and targetted systems which are using windows as their OS. Although, earlier we saw a large number of attacks taking place, but this attack is one of those that is being even remembered by other ransomware operators to launch their campaign. One important fact about this vulnerability is that this attack use Eternal Blue vulnerability to exploit the organization’s intranet and spread the ransomware in every…

  • News and Threat Analysis,  Tools, Tricks and More

    CITRIX WORKSPACE VULNERABILTIY ALLOWS REMOTE HACKING OF DEVICES

    It is a new trend that has been adopted by many corporates and organization in this outbreak is the Work from home strategy. There is no doubt that this strategy has resulted in generating quite a lot of profit for the corporates as they don’t have to feed their employees by hiring a physical workspace,spending on their transport, electricity bills, etc. They just need to ask employees to work more. It’s a tradition that every profit too has it’s own consequences. If a employer is working from home, all the work is done remotely. As the work is done remotely, security concerns takes place as now the organization’s intranet is…

  • News and Threat Analysis

    ATTACKERS ARE ENUMMERATING MISCONFIGURED DOCKER API TO DELIVER MALWARE INTO YOUR SYSTEM

    In today’s time, the growing technology has automated all of our task. Remember the times, when the first computer was created, it was as big as size of a room. Now you can interact with that same technology in as small size as a watch in your wrist. Obviously, if the complexity increases, the security becomes more difficult to handle . Every person has different point of view to view that technology and many loopholes can be generated in that technology . So combining all the above points, today we will talk about attacks that are taking place in Containership Infrastructure. WHAT IS CONTAINERIZATION? We all know that by using…

  • News and Threat Analysis

    RUSSIAN HACKERS ATTACK COVID-19 VACCINE RESEARCH ORGANIZATIONS

    We all know that, during this summers, our planet has been under a great pandemic due to China. This virus has not only affect our healths but there has been a worldwide shut down of economy and businesses of some countries. There is a lot of controversy still going on China, many nations are even banning its people and products but we all know, in today’s time, from your even luxury item to a small pin, China has some amount of contribution in manufacturing it. As the world’s biggest manufacturer, it also manufactured a virus named Coronavirus which affects citizen with a disease named Covid-19. Every country, institution, school, college,…