No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns…
No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns…
The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on…
In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind…
What is web filtering? Web filtering, also known as content filtering and URL filtering, restricts access to certain…
After news of Reliance Jio to launch its own cryptocurrency Jio emerged, a bunch of scammers seemed to…
This is a quick advisory to warn our readers about a new WhatsApp scam that is afoot. In…
Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a…
Recognized annually on January 28th, Data Privacy Day is defined as a centered approach towards respecting privacy, safeguarding…
Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining…
Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to…