Ryuk ransomware Attack on Jackson county fetches hackers a whopping $400,000

Ryuk Ransomware

Share this:    The entire computer system of Jackson County, Georgia was hit by a massive Ryuk ransomware attack on March 01. Authorities confirmed that the attack has affected all the departments. This ransomware leads to a complete shut down unless the files are recovered using the decryption key. Emails as well as emergency services were affected […]

Continue reading


Spear phishing is on the rise in 2019

Spear phishing

Share this:    One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly sophisticated well engineered attack to penetrate into the defense of a targeted victim and has high likelihood of success. The attackers knows enough about the victim to communicate with the victim as an alias […]

Continue reading


Latest cryptomining malwares uninstalls cloud security software

cryptomining malwares

Share this:    This is a new bread of malware! A very new malware is seen accomplishing never before seen function – uninstalling cloud security products! This new malware is capable of taking admin rights on targeted system by uninstalling the cloud-security products. Multiple occasions of the malicious activity are tied to coin-mining malware targeting Linux servers. […]

Continue reading


Web applications: new back-doors to access private data

web browser main

Share this:    Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists. Various browsers – Chrome, Firefox, Opera extension have been […]

Continue reading


Important cybersecurity statistics for 2019

cybersecurity statistics 2019

Share this:    Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the nature’s way of evolution, but it also means that there is a very different kind of warfare happening all […]

Continue reading


Chinese hackers swindles Rs. 130 crore from an Indian arm of an Italian company

Chinese group steals 18.3 million dollar in a cyber heist

Share this:    A Chinese hackers team stole 18.3 million dollars (Rs. 130 Crore) from the Indian arm of Italian company Tecnimont SpA by taking local managers into confidence that the money was required for an acquisition, one of the biggest cyber heists in the country,  the Economic Times reported. The hackers sent emails to the head of Tecnimont Pvt […]

Continue reading


Widespread Apple ID Phishing Attack Pretends to be App Store Receipts

apple0

Share this:    This is big, the Apple-ID which managed to stay away from compromises is under attack. A notorious phishing campaign is underway that pretends to be a purchase confirmation from the Apple App store. This has come to light recently and seems to be a classic phishing campaign and interestingly it has gone widespread quickly […]

Continue reading


Are the e-commerce sites cyber-safe?

ecommerce1

Share this:    Can there be someone else in your shopping cart? Well, the scenario does sound scary but it might very well be true. Hackers constantly come up with crafty ways to get into user accounts to siphon details and use them in various illegal activities. The payment card details are of particular interest to hackers […]

Continue reading


Economic Impact of DMARC for companies across the globe

Economic Impact of DMARC for companies

Share this:    What is DMARC? DMARC is a security standard which allows a domain to declare a policy of how it wants email processors to examine and treat emails claiming to be from that declaring domain. The core policies are “none” (do nothing special, and optionally report), or “quarantine” or “reject” messages which fail various other […]

Continue reading