Rarog – A cryptomining Trojan is out in the wild

Rarog

Share this:    A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency mining operations. Reseachers claim it to be an appealing option for hackers due to its low cost, easy configurations and support for multiple cryptocurrencies. Palo Alto Networks’ Unit 42 research team, which posted a blog on […]

Continue reading


Slingshot, an APT Malware making its way through routers in the Network

Slingshot

Share this:    An APT (Advanced Persistent Threat) malware, Slingshot, attacks victims by entering via routers and gaining kernel access to control the device entirely. According the Kaspersky researchers, this malware has unique tactics into entering the network as well as effectively stealing sensitive information by hiding itself in the plain day light. It is created by […]

Continue reading


Microsoft Office 365 provides new Advanced Security Features

Microsoft Office 365 with added Security features

Share this:    Microsoft Office 365 is widely popular work office suite, among the SMBs. Hence, no doubt that it has become one of the favourite targets of cyber criminals for viruses, ransomware scams and phishing attacks.  Last year we encountered some vicious ransomwares, like Wannacry and NotPetya, which had wreaked havoc across the globe affecting millions […]

Continue reading


Is blockchain the alchemy to DDoS attacks?

blockchain

Share this:    DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge volumes of traffic to overwhelm a server or network, slowing it or rendering it completely unresponsive. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and […]

Continue reading


Optimizing Disaster Recovery plans to get the best results

Optimizing your Disaster Recovery Plan

Share this:    To assume that IT disaster will not happen to your organization because of its upbeat security and support is living like an Ostrich hiding his face under sand after seeing a hunter. Disasters will happen and the only way to keep them from affecting the business is to stay prepared. A Disaster recovery plan […]

Continue reading


The rising and falling cyber security trends in 2018

The rising and falling cyber security trends in 2018

Share this:    Current Rising Trends of Cyber Security AI/Machine Learning is picking up Artificial Intelligence(AI) has the power to learn catch up with things and learning from the past experience predicting and stopping similar threats to occur in future. There will be more cyber security software using Machine Learning (ML) to crack any hacks or attacks. […]

Continue reading


Latest technology innovations affecting cyber security

latest technology innovations

Share this:    Technology is building our future, there is no denying but with every new innovation comes new vulnerabilities and hence the responsibility to make the internet more secure. The increasing digital connectivity and the automation of virtually all processes around the world in business and otherwise at all levels in the value chain have led […]

Continue reading