Blog

Browser in The Browser – A new near invisible attack

Browser in The Browser – A new near invisible attack

While reading on the different types of phishing attacks, recently I came across an interesting article by mr.d0x. His article explores the type of attack called Browser in the Browser (BITB). It is a novel phishing attack that exploits the user by simulating a browser window within a browser to spoof a legitimate domain. In

Read More
How Attack Vectors Can Harm Your Company

How Attack Vectors Can Harm Your Company

Effects Of Cyber Attacks : In recent years, we’ve likely to hear more about cybersecurity problems affecting all sorts and scales of businesses. This year, remote employment played a big role in the breach and the average cost was USD 1.07 million in which compromised credentials were the most prevalent first attack vector – accounting

Read More
Phishing and DDoS attacks on Ukraine

Phishing and DDoS attacks on Ukraine

“In the last 12 months, Threat Analysis Group (TAG) has issued hundreds of government-backed attack warnings to Ukrainian users alerting them that they have been the target of government-backed hacking, largely emanating from Russia.” wrote Shane Huntley, Google’s TAG lead. TAG has seen activity like espionage to phishing attempts from several threat actors, including FancyBear

Read More
Best practices for Data Loss Prevention

Best practices for Data Loss Prevention

We know that data is what drives the technology today. Data is a distinctive type of information that is collected and translated for a specific purpose. If the data is not formatted in the right way, it does not provide any value to both humans and computers. Data is considered sensitive when it gives classified

Read More