Cyber crime

Antivirus Security and the Role of Artificial Intelligence (AI)

With groundbreaking innovations and intelligent machines revolutionizing industries, the advent of AI is sparking endless possibilities  If you’re…

BEWARE: Fake Applications are Disguised as Legitimate Ones

In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis…

Protect yourself from Vishing Attack!!

“Humans are the weakest link in cybersecurity.” Data breaches worldwide prove this accurate, as human errors, lack of…

Vishing Attack

PowerShell: An Attacker’s Paradise

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

POWERSHELL: AN ATTACKER’S PARADISE

Robin Hood Ransomware ‘GOODWILL’ Forces Victim for Charity

Goodwill Ransomware, identified by CloudSEK researchers in March 2022, is known to promote social justice on the internet….

goodwill ransomware

Zloader: Entailing Different Office Files

Zloader aka Terdot – a variant of the infamous Zeus banking malware is well known for aggressively using…

Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

From late 2019, MAZE Ransomware started becoming infamous for its Encryption, data stealing and the subsequent selling of…

The modus operandi of the Maze Ransomware

Ako Ransomware targeting businesses using RaaS

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as…

How to protect yourself from becoming victim of UPI frauds?

A new and interesting kind of cyber theft is making rounds in the cyber world. This time the…

Cybersquatting and Typosquatting victimizing innocent customers and brands

The rapid shift of brands towards online platforms and ecommerce portals, has opened the gates for cyber threats…