World’s largest companies have adopted to DMARCs reject policy

Share this:    Large companies across the world receive phishing emails every day. There are a number of these companies who are still not aware of DMARC, however, a large number of big companies have started following DMARC policies. Companies that have adopted DMARC have seen impressive results in the fall of suspicious emails entering the company […]

Continue reading


Hospitality Sector Under the threat of AdvisorsBot malware

Advisorsbot

Share this:    A new malware downloader, AdvisorsBot, has been spotted affecting hospitality sector via email campaigns. It is being hosted by a hacker group going by the name TA555. The main targets have been restaurants, hotels and telecom sectors. Researchers from Proofpoint were able to track it back since May 2018. Major victims are from United […]

Continue reading


Cyber criminals siphoned Rs 94 crore off a co-operative bank in Pune

Cyber criminals siphoned Rs 94 crore off a co-operative bank in Pune

Share this:    Cyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos Bank. The money was allegedly transferred to accounts outside India. The server hosted at Pune had been attacked on August 11 and 13 exploiting bank’s ATM switch vulnerability. Bank’s management filed an FIR for it on Tuesday, August 13 at 1 am […]

Continue reading


Mitre ATT&CK Framework: A boon to your company’s Red Team

MITRE ATT&CK

Share this:    The MITRE ATT&CK Framework has become increasingly popular over the last few years. It was originally developed to support Mitre’s cyberdefense work but at this point it is both an enormous knowledge base of cyberattack technology and tactics and a model for understanding how those elements are used together to penetrate a target’s defenses. […]

Continue reading


Are your website images secured?

googleusercontent

Share this:    Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) data. Recently instances have occurred where in hackers are hiding malware in the images and uploading such images to the Google’s official CDN (Content Delivery Network) – googleusercontent.com. How malware is embedded in an […]

Continue reading


Why you must switch to HTTPS right now?

Secure your website with HTTPS

Share this:    It is high time to switch to HTTPS. The most important question lingering here is Why to move to HTTPS? To understand why, first we need to understand what is HTTPS? The Hypertext Transfer Protocol (HTTP) is an application protocol for communication over distributed, collaborative, and hypermedia information systems. HTTPS (HTTP Secure) is an adaptation of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and […]

Continue reading


Avoiding the rising DNS Binding Attacks for the smart devices

Is your device safe from DNS Rebinding Attack_

Share this:    What is a DNS Rebinding Attack? DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious websites and then making the user browser or device access unintended domains. Such attacks are normally used to compromise the system and exploit it as proxy for attacking the internal network. How DNS Rebinding […]

Continue reading


FelixRoot Backdoor Malware Resurfaced in a recent Campaign

Felixroot Backdoor

Share this:    Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back door of C&C server. Felixroot Backdoor malware campaign has resurfaced using Microsft Office vulnerabilities CVE-2017-0199 and CVE-2017-11882 to compromise the victim’s windows computers. It is being distributed by the file name “Seminal.rtf” claiming to provide information […]

Continue reading