web analytics
  • News and Threat Analysis

    MEET THIS NEW BORN INFOSTEALER IN RUSSIA NAMED PURPLEWAVE

    We all know that in this outbreak, we all have suffered a lot. Someone who knows about technology also knows that everyone’s privacy on the internet has been breached in someway, whether by the government or cyber criminals or the reputed brands. It is a different fact that experts know the way to protect themselves and their loved ones and thus are successful to escape from the breaches but for a normal guy, still it is a bitter truth that the word “privacy” is now the only shit to say our data is secure. Trackers and infostealers are everywhere either behind us or ahead of us. Exceptions are always there…

  • News and Threat Analysis,  Tools, Tricks and More

    THREAT ACTORS ARE USING OBFUSCATED PHISHING CAMPAIGNS TO DELIVER MALWARE

    If you are an ethical hacker trainer or have done a some kind of certifications in ethical hacking, you know how simple is to do phishing. Stronger is your social engineering knowledge, the more sophisticated phishing attacks you can launch. There are lots of tools available in the market which can help you set up your own phishing campaigns and spread your reign. Security researchers in tech giants like Google, Microsoft and AV companies work day and night to detect new phishing campaigns run by these malware operators and thus immediately update their databases to protect common unaware people about those campaigns. There is an always race among researchers and…

  • Let Us Learn,  News and Threat Analysis

    MUHSTIK BOTNET STRIKES AGAIN, EXPLOITING SERVERS WITH WEAK PASSWORDS

    In the 21st century, we all know the importance of privacy due to growth of digital era in all sectors. Either a person is educated or not, he/she knows the fact that they have to give utmost importance to their privacy. But the word privacy sometimes have double meaning. If we take the case of tech giants or organization, they are sometimes caught up tracking your personal data which they are not authorized to do so in the name of privacy, whereas on the other hand we all know hackers steal our data to exploit our privacy. As a privileged user, you can revoke the company or organization in first…

  • Let Us Learn,  News and Threat Analysis

    SMAUG RaaS IS HERE TO HELP CYBER CRIMINALS

    In this pandemic, the startups have excessively grown across the world due to millions of people losing their jobs across the world. Individuals having small amount of investment with them have put it all in their new startups thinking that they can make something big. There are no doubts that future of a startup is totally dependent upon the type of idea. Every idea is not big but sometimes resources provided to that idea make it a super hit. Tech giants like Google, Microsoft, Alibaba support many startups financially but their investment to startups totally depend upon what idea does an individual have? How much knowledge does he/she have about…

  • News and Threat Analysis,  Tools, Tricks and More

    DON’T PIP INSTALL “REQUEST” INSTEAD OF “REQUESTS”. IT IS A TROJAN!

    The most powerful, efficient and sophisticated language which every developer is addicted to is the Python. Whether they are scientist, programmers, hackers or script kiddies, everyone is just making innovative methods with this language. There are many people who have their first programming experience with this language. They learn to automate complex tasks with this language. As a computer langugae demands, you need to download some modules, libraries that can understand your actual source code. Therefore, python has for and by the developers open source community to support its users. This community is known as PyPi. In the Pypi, we can find thousand of developers contributing to different projects, modules…