APT Slingshot Infection on The Roll Through Routers

Recently at Security Analyst Summit renowned antivirus developer Kaspersky Lab found a cyber espionage threat malware called “Slingshot” that spies on user’s systems through routers. Security Researchers at...

Beware! Website Notifications May be Spamming Your Browser

Despite our email services filtering spam mails, spammers, always try to use new tactics to trick the users. The recent workaround found by them is, “web notification spam”....

How Hackers Attacked PyBitmessage to Steal Bitcoin Wallet Key

What is Zero-Day Vulnerability? These are security flaws unknown to developers and attacks that take advantage of this vulnerability are called Zero Day attack. What is Bitmessage? It...

Hide and Seek: New Botnet Threat

Internet of Things refers to devices connected to Internet; it can be your fridge, car, smartwatch or any other object. As is visible around us, it is growing...

WannaMine: A New Threat on Rise

As sophistication of attacks continues to grow, mentioning them as a catalyst to booming business won’t be a hyperbole. Eternal Blue the security exploit created by NSA and...

Top 10 Malware Myths and Facts (2024 Updated Guide)

We are always surrounded by modern technology, it is changing the way we use to do things. More and more devices are getting connected and instigating risk to...

Zyklon Malware -Exploits Microsoft Office Vulnerabilities Again

Zyklon, an HTTP botnet malware revamped after 2016 by exploiting the vulnerabilities present in Microsoft Office. Security researchers at FireEye reported that a malware named Zyklon, capable of...

Difference Between Virus, Worm and Trojan Horse

Often people mix terms like worms, trojan, spyware, they use them whenever there is a discussion on computer virus. But let me tell you using them interchangeably is...

Trojan horse! Take Prevention

Trojan horse is a type of malware which poses as a legitimate software or is attached on a genuine software or file and infects the system. It can...

Life Threatening Malware: Triton

Recently security researchers have revealed another dangerous piece of malware targeting industrial control systems (ICS). The infectious code dubbed Triton and is also known as Tisis, designed to...

Leakbase Is Reportedly Dead!

DDoS Attack bids farewell to Leakbase DDoS attack is rapidly increasing both in terms of frequency and severity. Recently, a website known Leakbase went offline following DDoS Attack....

IcedID New Banking Trojan

Over the past years, cybercrime has grown exponentially. Scammers use different tricks to dupe users, all of which have financial motivation. Recently, a new banking trojan dubbed IcedID,...