Cyber crime

Battling the Death Trap of Malicious Loan Apps

In the age of instant finance at our fingertips, loan apps have reshaped how we access funds. But…

Mallox Ransomware Strikes Unsecured MSSQL Servers

Introduction: First observed in the middle of 2021, ‘Mallox’ Ransomware has emerged as a formidable threat in the…

Antivirus Security and the Role of Artificial Intelligence (AI)

With groundbreaking innovations and intelligent machines revolutionizing industries, the advent of AI is sparking endless possibilities  If you’re…

BEWARE: Fake Applications are Disguised as Legitimate Ones

In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis…

Protect yourself from Vishing Attack!!

“Humans are the weakest link in cybersecurity.” Data breaches worldwide prove this accurate, as human errors, lack of…

Vishing Attack

PowerShell: An Attacker’s Paradise

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

POWERSHELL: AN ATTACKER’S PARADISE

Robin Hood Ransomware ‘GOODWILL’ Forces Victim for Charity

Goodwill Ransomware, identified by CloudSEK researchers in March 2022, is known to promote social justice on the internet….

goodwill ransomware

Zloader: Entailing Different Office Files

Zloader aka Terdot – a variant of the infamous Zeus banking malware is well known for aggressively using…

Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

From late 2019, MAZE Ransomware started becoming infamous for its Encryption, data stealing and the subsequent selling of…

The modus operandi of the Maze Ransomware

Ako Ransomware targeting businesses using RaaS

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as…