web analytics
  • News and Threat Analysis

    OPERATION EPIC MANCHEGO- MALDOCS DELIVERING EPIC INFOSTEALERS

    At some point in our life, we all come across some leadership responsibilities. For a leader, the most important characteristics is to get himself updated with his user’s data in order to analyze and increase their efficiency. Thus, a leader has to maintain a proper database that has both integrity and authenticity. These two features of a database determine its strength and lifeline. Popular for some past years, Microsoft’s Excel Spreadsheets are one of the most common utility used by many officials and staffers in every sector. From tourism to IT industry, every organization from different industries maintain several databases. In case of large and dynamic records, there is a…

  • News and Threat Analysis

    MEET THE YOUTH MRBMINER. A TROJAN WHICH HAS ALREADY MINED MONERO FROM THOUSANDS OF SERVERS.

    If we ask today’s youth, “What they like?”, the answer will be short and damn “fame”. Every youth in today’s time has a clear goal in his/her mind that he/she has to earn fame, but they don’t know what path to choose. Some may choose ethical and some may unethical. But adults knows this fact that fame comes from experience and hard work. Therefore, it is said that “Old is Gold”. In the past, we have covered articles many articles based on trojans that mines cryptocurrency from the systems. Today, we will talk about trojans from the same family but a youth from that family. Why we said youth? As…

  • News and Threat Analysis,  Tools, Tricks and More

    THREAT ACTORS ARE USING OBFUSCATED PHISHING CAMPAIGNS TO DELIVER MALWARE

    If you are an ethical hacker trainer or have done a some kind of certifications in ethical hacking, you know how simple is to do phishing. Stronger is your social engineering knowledge, the more sophisticated phishing attacks you can launch. There are lots of tools available in the market which can help you set up your own phishing campaigns and spread your reign. Security researchers in tech giants like Google, Microsoft and AV companies work day and night to detect new phishing campaigns run by these malware operators and thus immediately update their databases to protect common unaware people about those campaigns. There is an always race among researchers and…

  • Let Us Learn,  News and Threat Analysis

    MUHSTIK BOTNET STRIKES AGAIN, EXPLOITING SERVERS WITH WEAK PASSWORDS

    In the 21st century, we all know the importance of privacy due to growth of digital era in all sectors. Either a person is educated or not, he/she knows the fact that they have to give utmost importance to their privacy. But the word privacy sometimes have double meaning. If we take the case of tech giants or organization, they are sometimes caught up tracking your personal data which they are not authorized to do so in the name of privacy, whereas on the other hand we all know hackers steal our data to exploit our privacy. As a privileged user, you can revoke the company or organization in first…

  • News and Threat Analysis,  Tools, Tricks and More

    DON’T PIP INSTALL “REQUEST” INSTEAD OF “REQUESTS”. IT IS A TROJAN!

    The most powerful, efficient and sophisticated language which every developer is addicted to is the Python. Whether they are scientist, programmers, hackers or script kiddies, everyone is just making innovative methods with this language. There are many people who have their first programming experience with this language. They learn to automate complex tasks with this language. As a computer langugae demands, you need to download some modules, libraries that can understand your actual source code. Therefore, python has for and by the developers open source community to support its users. This community is known as PyPi. In the Pypi, we can find thousand of developers contributing to different projects, modules…