Avoiding the rising DNS Binding Attacks for the smart devices

Is your device safe from DNS Rebinding Attack_

What is a DNS Rebinding Attack? DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious websites and then making the user browser or device access unintended domains. Such attacks are normally used to compromise the system and exploit it as proxy for attacking the internal network. How DNS Rebinding Attacks […]

Continue reading


FelixRoot Backdoor Malware Resurfaced in a recent Campaign

Felixroot Backdoor

Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back door of C&C server. Felixroot Backdoor malware campaign has resurfaced using Microsft Office vulnerabilities CVE-2017-0199 and CVE-2017-11882 to compromise the victim’s windows computers. It is being distributed by the file name “Seminal.rtf” claiming to provide information on […]

Continue reading


FlawedAmmyy RAT being delivered via TA505 email spam campaigns

FlawedAmmyy RAT

Always be cautious while opening email attachments. Recently, hackers have been sending weaponized PDFs containing malicious SettingContent-ms files containing FlawedAmmyy RAT, reported by researchers at SecurityOps. SettingContent-ms file opens the Control Panel for the user. The interesting aspect of this file is the <DeepLink> element in the schema. This element takes any binary with parameters and executes […]

Continue reading


Cloud Technology has brought in a paradigm shift in Storing Data

Cloud Technology has brought a paradigm shift in storing Data

Cloud Computing has flourished enormously over the past few years. It has changed the concept of data storage altogether. Every day new innovations and developments are made in cloud computing. Here are some major points how cloud computing is reshaping the IT world: Storing data safely with minimal human effort Data is being stored in […]

Continue reading


What is DMARC? Why is it important for your business?

DMARC policies

What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technology advancement in preventing email and domain spoofing. It ensures that emails go through a domain based check and then sent to the recipient. It uses DKIM and SPF standards along with additional standards of its own. It is really challenging to tell […]

Continue reading


Bypass glitch makes Mac OS vulnerable due to improper code-signing implementation

Is your MacOS secure

A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to be signed by Apple. All the third-party vendors have issued patch once they realized that their software was not interacting correctly with the Apple’s code-signing API. Without the patch, attackers can craft malicious code and […]

Continue reading


Beware of this Top 10 most misused Domains

In the latest research it is revealed that, some of the latest TLDs (Top-Level Domains) such as .men, .work and .click are the riskiest and most misused domains over the internet. Ofcourse, there are many rogue .com and .net TLDs as well but research reveals these are lesser misused than the one mentioned before. Some […]

Continue reading


Why Blockchain may not be the elixir to internet security

blockchain

Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but at the same time, that tool cannot be right for all the situations. There are a lot of confusions running around regarding Blockchain. Many consider it equivalent to bitcoins although both are different, bitcoin being […]

Continue reading


Top 3 cyber security concepts for 2018

2018 Cyber Security Concepts

Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security concepts and solutions to thrive in the market. The 2018 RSA Conference was exceedingly productive and proactive in bringing out latest cyber security concepts instead of relying on the outdated, legacy ones. Here is a […]

Continue reading