# Tags

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the shadows of the past. It’s a story that began in the early 1990s, during the DOS era, when computer viruses were still a novel and mysterious menace. This is the tale of Joshi, a virus of Indian […]

Persistence in the Shadows: A Study of Zephyr Miner Exploiting System Services

Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex mathematical problems, validating transactions on a blockchain network and earning cryptocurrency coins. This activity has gained popularity with the increasing value of digital currencies, leading some malicious actors to exploit users’ devices for their own gain. Cybercriminals […]