Category: Uncategorized

Hackers Infecting PCs With Windows Update Malware

Hackers Infecting PCs With Windows Update Malware

Trojanized version of IDA Pro: The North Korea state-sponsored group- Lazarus used a trojanized pirated version of the popular IDA Pro reverse engineering software (which translates machine language into assembly language) to target security researchers with available backdoors and remote access trojans. IDA Pro enables security researchers to analyze the malicious and debugger to detect

Read More
Ransomware Protection and Response

Ransomware Protection and Response

Over the past weeks, we discussed What is ransomware, and the Anatomy of ransomware attacks. Now, let us look into some ways to protect yourself from ransomware and how to respond if you fall victim to any. According to IBM, ransomware attacks are very high which contributes up to more than 23% of total cybersecurity

Read More
TOP 10 CYBER SECURITY BEST PRACTICES TO FOLLOW IN 2022

TOP 10 CYBER SECURITY BEST PRACTICES TO FOLLOW IN 2022

Educate your workforce about the importance of security and about the highly evolving threat landscape. Make these below mentioned practices a part of your work culture to prevent your organization from ransomware attacks: 1.Multi-Factor Authentication Multi-Factor Authentication is one of the most effective controls in preventing unauthorized access by bad actors. Authentication uses two or more

Read More
Android malware BRATA strikes again with new dangerous capabilities

Android malware BRATA strikes again with new dangerous capabilities

Android malware BRATA gained new dangerous features in the latest version like GPS tracking, the ability to use various communication channels and factory reset to hide fraudulent wire transfer. BRATA – Brazilian Remote Access Tool (RAT) Android was a spyware, which was later known to be a banking trojan. This spyware was found out by

Read More