UIWIX Ransomware. The threat of WannaCry is not over yet.

Ransomware UIWIX

The evolved version of Wannacry ransomware; UIWIX Ransomware continues to shock the world. WannaCry Ransomware began spreading on May 12th but was accidentally stopped by a kill switch triggered by a MalwareTech researcher. However, it looks like the kill switch did not completely stop the spread rather slowed the speed. Hackers have since then updated […]

Continue reading


The latest global cyberattack – Wannacry Ransomware.

WannaCry

On May 12th 2017, a ransomware of WannaCry or Wcry started spreading like wildfire starting from NHS system in UK. It spread to dozens of hospitals from where it spread to 6 continents affecting more than 100,000 machines! It caused chaos at hospitals, schools and universities, manufacturing shutdowns, and overtime for cybersecurity professionals.  Reports have confirmed malicious […]

Continue reading


Received a new job offer? Beware- Genuine or Fake?

Fake Job Offers

Scammers are on the rise with more and more fictitious job offers appearing on job boards. More job seekers are being conned into traps to part with some amount of money or are becoming victims of identity theft. However, there are certain trends which can help user identify an email if it is fake job […]

Continue reading


Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!

cyber attack

Red-team cyber security testing is optimally designed to measure how well your company’s defense and response capabilities will hold under a cyber-attack. All the tests are performed in a simulated environment which creates real-life situation. What is Red Team Exercise? It is an exercise based on military model, Red Teams are designed to rigorously test […]

Continue reading


How are Locky and Cerber Ransomware Skilled at hiding themselves?

locky and cerber ransomware

2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They are acutely notorious in hiding in plain sight. The camouflage helps the ransomware to hide inside the system and attack when unexpected. Once they encrypt the files there is no other way except to pay […]

Continue reading


PetrWrap: Cybercriminals stealing code from one another

petrwrap

The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of the ransomware shares the malware code as a product and shares the profits (ransom) after any attacker uses the Petya malware and succeeds.  Cyber criminals have found a way to use the code without sharing […]

Continue reading


Kirk Ransomware: Star trek themed malware!

Kirk Ransomware

A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware demanding Monero cryptocurrency instead of Bitcoin. It was discovered by Avast malware researcher Jakub Kroustek. Cyber criminals are turning highly sophisticated with better, more secure ways to ask for ransom and hence a first for […]

Continue reading


The Home Ministry’s website hacked on 2017 February 12

home ministry’s website hacked

On 12th February, 2017 the home ministry’s website got hacked. Attacks on our digital borders have been increasing for some time now. Is this an indication that we are heading for a war for which we aren’t sufficiently prepared? How do you fight something so intangible? We cannot put men with firearms to kill the […]

Continue reading